Meikang Qiu

Orcid: 0000-0002-1004-0140

Affiliations:
  • Texas A&M University Commerce, Department of Computer Science, TX, USA
  • Columbia University, Department of Electrical Engineering, New York, NY, USA
  • University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA (PhD 2007)


According to our database1, Meikang Qiu authored at least 502 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward fair graph neural networks via real counterfactual samples.
Knowl. Inf. Syst., November, 2024

ReIPE: Recycling Idle PEs in CNN Accelerator for Vulnerable Filters Soft-Error Detection.
ACM Trans. Archit. Code Optim., September, 2024

ApproxDup: Developing an Approximate Instruction Duplication Mechanism for Efficient SDC Detection in GPGPUs.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2024

Human-Aware Dynamic Hierarchical Network Control for Distributed Metaverse Services.
IEEE J. Sel. Areas Commun., March, 2024

Resource Critical Flow Monitoring in Software-Defined Networks.
IEEE/ACM Trans. Netw., February, 2024

BlockSense: Towards Trustworthy Mobile Crowdsensing via Proof-of-Data Blockchain.
IEEE Trans. Mob. Comput., February, 2024

DUAL-C: Building a "soft error efficient" on-the-fly compression mechanism for raw video data at edge devices.
Future Gener. Comput. Syst., 2024

Hierarchical Features Matter: A Deep Exploration of GAN Priors for Improved Dataset Distillation.
CoRR, 2024

Adversarial Attacks on Large Language Models.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Different Attack and Defense Types for AI Cybersecurity.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Reentrancy Vulnerability Detection Based on Improved Attention Mechanism.
Proceedings of the Knowledge Science, Engineering and Management, 2024

AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and Utility.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Contrastive Learning for Money Laundering Detection: Node-Subgraph-Node Method with Context Aggregation and Enhancement Strategy.
Proceedings of the Knowledge Science, Engineering and Management, 2024

GenFlowchart: Parsing and Understanding Flowchart Using Generative AI.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Dólares or Dollars? Unraveling the Bilingual Prowess of Financial LLMs Between Spanish and English.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Self-consistent Deep Geometric Learning for Heterogeneous Multi-source Spatial Point Data Prediction.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Graph Attention Network with High-Order Neighbor Information Propagation for Social Recommendation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Visual Attention Prompted Prediction and Learning.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
Guest editorial: Special issue on edge computing optimization and security.
J. Syst. Archit., December, 2023

Maximizing the Connectivity of Network Slicing Enabled Internet of Vehicle With Differentiated Services.
IEEE Trans. Intell. Transp. Syst., November, 2023

TGAE: Temporal Graph Autoencoder for Travel Forecasting.
IEEE Trans. Intell. Transp. Syst., August, 2023

Location-and-Preference Joint Prediction for Task Assignment in Spatial Crowdsourcing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2023

DefQ: Defensive Quantization Against Inference Slow-Down Attack for Edge Computing.
IEEE Internet Things J., February, 2023

ADS-Lead: Lifelong Anomaly Detection in Autonomous Driving Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin.
IEEE Trans. Serv. Comput., 2023

Energy and Reliability-Aware Task Scheduling for Cost Optimization of DVFS-Enabled Cloud Workflows.
IEEE Trans. Cloud Comput., 2023

RISAT: real-time instance segmentation with adversarial training.
Multim. Tools Appl., 2023

Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection.
IEEE Internet Things J., 2023

Differentially Private Low-Rank Adaptation of Large Language Model Using Federated Learning.
CoRR, 2023

A Survey on Temporal Knowledge Graph Completion: Taxonomy, Progress, and Prospects.
CoRR, 2023

Deep Graph Representation Learning and Optimization for Influence Maximization.
CoRR, 2023

Towards Fair Machine Learning Software: Understanding and Addressing Model Bias Through Counterfactual Thinking.
CoRR, 2023

Access Control, Biometrics, and the Future.
Proceedings of the 5th International Conference on Image, Video and Signal Processing, 2023

Communication-Efficient Stochastic Gradient Descent Ascent with Momentum Algorithms.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Deep Graph Representation Learning and Optimization for Influence Maximization.
Proceedings of the International Conference on Machine Learning, 2023

Investigating Code Generation Performance of ChatGPT with Crowdsourcing Social Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Multi-level Encryption for Agricultural Data Protection.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

The Impact of ChatGPT on Streaming Media: A Crowdsourced and Data-Driven Analysis using Twitter and Reddit.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond.
ACM Trans. Sens. Networks, November, 2022

Digital Twin-enabled AI Enhancement in Smart Critical Infrastructures for 5G.
ACM Trans. Sens. Networks, 2022

Neural Network Pruning by Recurrent Weights for Finance Market.
ACM Trans. Internet Techn., 2022

An Efficient Service Recommendation Algorithm for Cyber-Physical-Social Systems.
IEEE Trans. Netw. Sci. Eng., 2022

An Analytical Model of Page Dissemination for Efficient Big Data Transmission of C-ITS.
IEEE Trans. Intell. Transp. Syst., 2022

A Novel Two-Stage Unsupervised Fault Recognition Framework Combining Feature Extraction and Fuzzy Clustering for Collaborative AIoT.
IEEE Trans. Ind. Informatics, 2022

Multi-Access Filtering for Privacy-Preserving Fog Computing.
IEEE Trans. Cloud Comput., 2022

Personality- and Value-Aware Scheduling of User Requests in Cloud for Profit Maximization.
IEEE Trans. Cloud Comput., 2022

Eff-ECC: Protecting GPGPUs Register File With a Unified Energy-Efficient ECC Mechanism.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Client Scheduling and Resource Management for Efficient Training in Heterogeneous IoT-Edge Federated Learning.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

WheelLoc: Practical and Accurate Localization for Wheeled Mobile Targets via Integrated Sensing and Communication.
IEEE J. Sel. Areas Commun., 2022

Utility-driven renewable energy sharing systems for community microgrid.
J. Syst. Archit., 2022

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022

Joint Beamforming Coordination and User Selection for CoMP-Enabled NR-U Networks.
IEEE Internet Things J., 2022

Reliable Data Collection Techniques in Underwater Wireless Sensor Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2022

A Novel Machine Learning-Based Model for Reentrant Vulnerabilities Detection.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Architecture Search for Deep Neural Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Component Extraction for Deep Learning Through Progressive Method.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Performance Impacts of JavaScript-Based Encryption of HTML5 Web Storage for Enhanced Privacy.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

Energy-Based Learning for Polluted Outlier Detection in Backdoor.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

Approximation Algorithms for Reliability-Aware Maximum VoI on AUV-Aided Data Collections.
Proceedings of the Network and Parallel Computing, 2022

Mitigating Targeted Bit-Flip Attacks via Data Augmentation: An Empirical Study.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Energy-Based Learning for Preventing Backdoor Attack.
Proceedings of the Knowledge Science, Engineering and Management, 2022

W-Hash: A Novel Word Hash Clustering Algorithm for Large-Scale Chinese Short Text Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2022

A Novel RVFL-Based Algorithm Selection Approach for Software Model Checking.
Proceedings of the Knowledge Science, Engineering and Management, 2022

BLSHF: Broad Learning System with Hybrid Features.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Watermarking Pre-trained Encoders in Contrastive Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Recommendation System Design for Social Media using Reinforcement Learning.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80.
Proceedings of the International Conference on Compilers, 2022

Efficient Process Scheduling for Multi-core Systems.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
Compressed Imaging Reconstruction with Sparse Random Projection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Intelligent Fault Diagnosis by Fusing Domain Adversarial Training and Maximum Mean Discrepancy via Ensemble Learning.
IEEE Trans. Ind. Informatics, 2021

A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT.
IEEE Trans. Cloud Comput., 2021

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing.
IEEE Trans. Big Data, 2021

A Linear NAS Service of ConvNets for Fast Deployment in the Edge of 5G Networks.
IEEE Netw., 2021

Guest editorial: Special issue on next generation AI approaches for intelligent internet of things.
J. Syst. Archit., 2021

Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems.
IEEE Internet Things J., 2021

Special Issue on Robustness and Efficiency in the Convergence of Artificial Intelligence and IoT.
IEEE Internet Things J., 2021

Adversarial Attacks Against Network Intrusion Detection in IoT Systems.
IEEE Internet Things J., 2021

AI and Machine Learning for Industrial Security With Level Discovery Method.
IEEE Internet Things J., 2021

IoT Microservice Deployment in Edge-Cloud Hybrid Environment Using Reinforcement Learning.
IEEE Internet Things J., 2021

Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021

A Novel Client Sampling Scheme for Unbalanced Data Distribution Under Federated Learning.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

Dense Incremental Extreme Learning Machine with Accelerating Amount and Proportional Integral Differential.
Proceedings of the Knowledge Science, Engineering and Management, 2021

GAN-Enabled Code Embedding for Reentrant Vulnerabilities Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2021

An Edge Trajectory Protection Approach Using Blockchain.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Optimization of Remote Desktop with CNN-based Image Compression Model.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME.
Proceedings of the Knowledge Science, Engineering and Management, 2021

A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Big Data Analysis with Momentum Strategy on Data-driven Trading.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Distributed Computation Offloading Scheduling Framework based on Deep Reinforcement Learning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Accuracy vs. Efficiency: Achieving both Through Hardware-Aware Quantization and Reconfigurable Architecture with Mixed Precision.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Secure Identity Authentication Protocol for Edge Data in Smart Grid Environment.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Identification Method of Ancient Ceramics Revision.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Blockchain-Based Access Control Approaches.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Machine Learning Based Network Censorship.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Research on Sentiment Dictionary Based on Sentiment Analysis in News Domain.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
A Trust Verification Architecture with Hardware Root for Secure Clouds.
IEEE Trans. Sustain. Comput., 2020

PSAC: Proactive Sequence-Aware Content Caching via Deep Learning at the Network Edge.
IEEE Trans. Netw. Sci. Eng., 2020

Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0.
IEEE J. Biomed. Health Informatics, 2020

Retraining Strategy-Based Domain Adaption Network for Intelligent Fault Diagnosis.
IEEE Trans. Ind. Informatics, 2020

Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics.
IEEE Trans. Ind. Informatics, 2020

Differential Privacy-Based Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Distributed Feature Selection for Big Data Using Fuzzy Rough Sets.
IEEE Trans. Fuzzy Syst., 2020

Lightweight Selective Encryption for Social Data Protection Based on EBCOT Coding.
IEEE Trans. Comput. Soc. Syst., 2020

Crowdsensing-Based Cross-Operator Switch in Rail Transit Systems.
IEEE Trans. Commun., 2020

Phase-Reconfigurable Shuffle Optimization for Hadoop MapReduce.
IEEE Trans. Cloud Comput., 2020

Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

Distributed Caching Mechanism for Popular Services Distribution in Converged Overlay Networks.
IEEE Trans. Broadcast., 2020

Special issue on 'smart computing and communication' in International Journal of Parallel, Emergent and Distributed Systems.
Int. J. Parallel Emergent Distributed Syst., 2020

Secure V2X Communication Network based on Intelligent PKI and Edge Computing.
IEEE Netw., 2020

Selective encryption on ECG data in body sensor network based on supervised machine learning.
Inf. Fusion, 2020

Integrating aspect analysis and local outlier factor for intelligent review spam detection.
Future Gener. Comput. Syst., 2020

Intelligent security and optimization in Edge/Fog Computing.
Future Gener. Comput. Syst., 2020

FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques.
CoRR, 2020

Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.
CoRR, 2020

Resisting Adversarial Examples via Wavelet Extension and Denoising.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

A Study of Pre-trained Language Models in Natural Language Processing.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

AI Enhanced Blockchain (II).
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

AI Enhanced Blockchain (I).
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

An Improved News Recommendation Algorithm Based on Text Similarity.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

News Text Classification Based on MLCNN and BiGRU Hybrid Neural Network.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Neural Network Compression and Acceleration by Federated Pruning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Collaborative Design Service System Based on Ceramic Cloud Service Platform.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Comparative Analysis of Three Kinds of Laser SLAM Algorithms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service Platform.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Authentication Study for Brain-Based Computer Interfaces Using Music Stimulations.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Reputation-Based Trustworthy Supply Chain Management Using Smart Contract.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Digital Currency Investment Strategy Framework Based on Ranking.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

An Improved Heterogeneous Dynamic List Schedule Algorithm.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Design and Implementation of Virtual Pottery Space Based on Ceramic Cloud Service Platform.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Automated Student Engagement Monitoring and Evaluation during Learning in the Wild.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Message from the General Chair CSCloud-EdgeCom 2020.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Cost Minimization for Music Uploading to a Cloudlet.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Intelligent Algorithm for Ceramic Decorative Pattern Style Transfer Based on CycleGAN.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Autonomous Driving and Control: Case Studies with Self-Driving Platforms.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

A Parallel Integer Relative Robust Mean-RCVaR Model for Portfolio optimization.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Review on Image Processing Based Adversarial Example Defenses in Computer Vision.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Application of Blockchain in Asset-Backed Securitization.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

VR Design and Display System of Ceramic Products Based on Cloud Service Platform.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Fusion of Cognitive Wireless Networks and Edge Computing.
IEEE Wirel. Commun., 2019

Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Secure Sustainable Green Smart Computing.
IEEE Trans. Sustain. Comput., 2019

Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Smart Data and Deep Learning in Sustainable Computing.
IEEE Trans. Sustain. Comput., 2019

A Study on Big Knowledge and Its Engineering Issues.
IEEE Trans. Knowl. Data Eng., 2019

Optimal solution to intelligent multi-channel wireless communications using dynamic programming.
J. Supercomput., 2019

Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid.
IEEE Trans. Ind. Informatics, 2019

SNC: A Cloud Service Platform for Symbolic-Numeric Computation Using Just-In-Time Compilation.
IEEE Trans. Cloud Comput., 2019

Loop Parallelism Maximization for Multimedia Data Processing in Mobile Vehicular Clouds.
IEEE Trans. Cloud Comput., 2019

Cache-Based Popular Services Pushing on High-Speed Train by Using Converged Broadcasting and Cellular Networks.
IEEE Trans. Broadcast., 2019

Toward Smart Treatment Management for Personalized Healthcare.
IEEE Netw., 2019

Special Section on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends.
J. Parallel Distributed Comput., 2019

A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model.
J. Organ. End User Comput., 2019

Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives.
Inf. Sci., 2019

An efficient key distribution system for data fusion in V2X heterogeneous networks.
Inf. Fusion, 2019

Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things.
Future Gener. Comput. Syst., 2019

A general AI-defined attention network for predicting CDN performance.
Future Gener. Comput. Syst., 2019

Privacy-preserving Health Data Sharing for Medical Cyber-Physical Systems.
CoRR, 2019

Recurrent Tensor Factorization for time-aware service recommendation.
Appl. Soft Comput., 2019

AI Enhanced Automatic Response System for Resisting Network Threats.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Machine Learning for Cancer Subtype Prediction with FSA Method.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Autonomous Vehicle Communication in V2X Network with LoRa Protocol.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

An adversarial reinforcement learning based system for cyber security.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

CECoR-Net: A Character-Level Neural Network Model for Web Attack Detection.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Using Adversarial Examples to Bypass Deep Learning Based URL Detection System.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Reliability Aware Cost Optimization for Memory Constrained Cloud Workflows.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

V-PSC: A Perturbation-Based Causative Attack Against DL Classifiers' Supply Chain in VANET.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
A Query-oriented Adaptive Indexing Technique for Smart Grid Big Data Analytics.
J. Signal Process. Syst., 2018

Informed Prefetching for Distributed Multi-Level Storage Systems.
J. Signal Process. Syst., 2018

Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing.
IEEE Trans. Sustain. Comput., 2018

E2FS: an elastic storage system for cloud computing.
J. Supercomput., 2018

Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers.
IEEE Trans. Ind. Informatics, 2018

A Hardware Pipeline with High Energy and Resource Efficiency for FMM Acceleration.
ACM Trans. Embed. Comput. Syst., 2018

Guest Editor's Introduction to the Special Section on Social Network Security.
IEEE Trans. Dependable Secur. Comput., 2018

Guest Editor's Introduction to the Special Issue on Security and Privacy on Clouds.
IEEE Trans. Cloud Comput., 2018

Cloud Infrastructure Resource Allocation for Big Data Applications.
IEEE Trans. Big Data, 2018

Reinforcement Learning-based Content-Centric Services in Mobile Sensing.
IEEE Netw., 2018

Introduction to the special issue on "Embedded Artificial Intelligence and Smart Computing".
J. Syst. Archit., 2018

IoTDeM: An IoT Big Data-oriented MapReduce performance prediction extended model in multiple edge clouds.
J. Parallel Distributed Comput., 2018

Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing.
J. Parallel Distributed Comput., 2018

Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data.
J. Comput. Sci., 2018

A survey on FinTech.
J. Netw. Comput. Appl., 2018

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.
IEEE Internet Things J., 2018

A locality-aware shuffle optimization on fat-tree data centers.
Future Gener. Comput. Syst., 2018

Privacy-preserving wireless communications using bipartite matching in social big data.
Future Gener. Comput. Syst., 2018

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry.
Future Gener. Comput. Syst., 2018

Privacy-preserving multi-channel communication in Edge-of-Things.
Future Gener. Comput. Syst., 2018

In-memory big data analytics under space constraints using dynamic programming.
Future Gener. Comput. Syst., 2018

Privacy-preserving smart data storage for financial industry in cloud computing.
Concurr. Comput. Pract. Exp., 2018

SPHA: Smart Personal Health Advisor Based on Deep Analytics.
IEEE Commun. Mag., 2018

Optimal resource allocation using reinforcement learning for IoT content-centric services.
Appl. Soft Comput., 2018

Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Multiple Layer Sercurity Architecture for Internet of Things into MVC Design.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A K-Anonymous Full Domain Generalization Algorithm Based on Heap Sort.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Senior2Local: A Machine Learning Based Intrusion Detection Method for VANETs.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Reconfigurable Hardware Generation for Tensor Flow Models of CNN Algorithms on a Heterogeneous Acceleration Platform.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Smartly Deploying WeChat Mobile Application on Cloud Foundry PaaS.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

A Dynamic Scalable Blockchain Based Communication Architecture for IoT.
Proceedings of the Smart Blockchain - First International Conference, 2018

Channel Estimation over Doubly Selective Channels Based on Basis Expansion Model and Compressive Sensing.
Proceedings of the Digital TV and Multimedia Communication - 15th International Forum, 2018

Heterogeneous Assignment of Functional Units with Gaussian Execution Time on A Tree.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Diffusional Schedule for Traffic Reducing on Network-on-Chip.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

On Popular Services Pushing and Distributed Caching in Converged Overlay Networks.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

On Services Unequal Error Protecting and Pushing by Using Terrestrial Broadcasting Network.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

Speech Denoising Using Bayesian NMF with Online Base Update.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

A Resource Scheduling Algorithm Based on Maximum Discrete VM in Heterogeneity Cloud.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Kernel Learning Method on Riemannian Manifold with Geodesic Distance Preservation.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

A Fast Security Evaluation of Support Vector Machine Against Evasion Attack.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Privacy-Preserving Access Control Using Dynamic Programming in Fog Computing.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
A Strategy to Improve the Efficiency of I/O Intensive Application in Cloud Computing Environment.
J. Signal Process. Syst., 2017

HHT-Based Security Enhancement Approach with Low Overhead for Coding-Based Reprogramming Protocols in Wireless Sensor Networks.
J. Signal Process. Syst., 2017

Energy Efficiency Optimization for Communication of Air-Based Information Network with Guaranteed Timing Constraints.
J. Signal Process. Syst., 2017

SROC: A Speaker Recognition with Data Decision Level Fusion Method in Cloud Environment.
J. Signal Process. Syst., 2017

Keystroke Biometric Systems for User Authentication.
J. Signal Process. Syst., 2017

Guest Editorial Smart Grid Cyber-Physical Security.
IEEE Trans. Smart Grid, 2017

Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks.
IEEE Trans. Smart Grid, 2017

Research on application classification method in cloud computing environment.
J. Supercomput., 2017

Embedded multi-core computing and applications.
J. Supercomput., 2017

Supporting high-quality video streaming with SDN-based CDNs.
J. Supercomput., 2017

An efficient cloud storage system for tele-health services.
J. Supercomput., 2017

Harmonicity-Aware Task Partitioning for Fixed Priority Scheduling of Probabilistic Real-Time Tasks on Multi-Core Platforms.
ACM Trans. Embed. Comput. Syst., 2017

SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing.
ACM Trans. Embed. Comput. Syst., 2017

An FPGA-Based Cloud System for Massive ECG Data Analysis.
IEEE Trans. Circuits Syst. II Express Briefs, 2017

Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data.
IEEE Syst. J., 2017

Energy-Aware Data Allocation With Hybrid Memory for Mobile Cloud Systems.
IEEE Syst. J., 2017

Energy Optimization With Dynamic Task Scheduling Mobile Cloud Computing.
IEEE Syst. J., 2017

Novel online data allocation for hybrid memories on tele-health systems.
Microprocess. Microsystems, 2017

Dynamic application allocation with resource balancing on NoC based many-core embedded systems.
J. Syst. Archit., 2017

An energy-efficient system on a programmable chip platform for cloud applications.
J. Syst. Archit., 2017

Enabling real-time information service on telehealth system over cloud-based big data platform.
J. Syst. Archit., 2017

Special Issue on Scalable Cyber-Physical Systems.
J. Parallel Distributed Comput., 2017

Intelligent cryptography approach for secure distributed big data storage in cloud computing.
Inf. Sci., 2017

Revisiting swapping in mobile systems with SwapBench.
Future Gener. Comput. Syst., 2017

EDS: An Efficient Data Selection policy for search engine storage architectures.
Future Gener. Comput. Syst., 2017

Modeling recommender systems via weighted bipartite network.
Concurr. Comput. Pract. Exp., 2017

Adaptive human detection approach using FPGA-based parallel architecture in reconfigurable hardware.
Concurr. Comput. Pract. Exp., 2017

Special issue on Big Data Security and Intelligent Data in Clouds (BDS-IDC).
Concurr. Comput. Pract. Exp., 2017

Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing.
Concurr. Comput. Pract. Exp., 2017

A Scalable and Quick-Response Software Defined Vehicular Network Assisted by Mobile Edge Computing.
IEEE Commun. Mag., 2017

Who Moved My Data? Privacy Protection in Smartphones.
IEEE Commun. Mag., 2017

Research on Optimizing Last Level Cache Performance for Hybrid Main Memory.
Proceedings of the Smart Computing and Communication, 2017

Empirical Study of Data Allocation in Heterogeneous Memory.
Proceedings of the Smart Computing and Communication, 2017

Smart Resource Allocation Using Reinforcement Learning in Content-Centric Cyber-Physical Systems.
Proceedings of the Smart Computing and Communication, 2017

Similarity-Based Node Distance Exploring and Locality-Aware Shuffle Optimization for Hadoop MapReduce.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

DASS: A Web-Based Fine-Grained Data Access System for Smartphones.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A Privacy-Protection Data Separation Approach for Fine-Grained Data Access Management.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Flexible Consistency for Distributed Storage Systems.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A Design for Scalable and Secure Key-Value Stores.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A Greedy Approach for Caching in Distributed Data Stores.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Integrated Quality Mesh Generation for Poisson Surface Reconstruction in HPC Applications.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

Brain-Based Computer Interfaces in Virtual Reality.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Advanced Fully Homomorphic Encryption Scheme Over Real Numbers.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

On services pushing and caching in high-speed train by using converged broadcasting and cellular networks.
Proceedings of the 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2017

An Optimal Fully Homomorphic Encryption Scheme.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2016
TIGER: Thermal-Aware File Assignment in Storage Clusters.
IEEE Trans. Parallel Distributed Syst., 2016

Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Public Vehicles for Future Urban Transportation.
IEEE Trans. Intell. Transp. Syst., 2016

Guest Editorial: Special Issue on Emerging Technologies in Embedded Software and Systems.
ACM Trans. Embed. Comput. Syst., 2016

A Real-Time FPGA-Based Accelerator for ECG Analysis and Diagnosis Using Association-Rule Mining.
ACM Trans. Embed. Comput. Syst., 2016

Privacy Protection for Preventing Data Over-Collection in Smart City.
IEEE Trans. Computers, 2016

Mobility-Aware Caching and Computation Offloading in 5G Ultra-Dense Cellular Networks.
Sensors, 2016

Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.
Secur. Commun. Networks, 2016

Transfer Problem in a Cloud-based Public Vehicle System with Sustainable Discomfort.
Mob. Networks Appl., 2016

Cloud-assisted Industrial Systems and Applications.
Mob. Networks Appl., 2016

Special Issue on High Performance Computing, Communication and Embedded Software/Systems.
J. Syst. Archit., 2016

Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.
J. Netw. Comput. Appl., 2016

Smart data deduplication for telehealth systems in heterogeneous cloud computing.
J. Commun. Inf. Networks, 2016

Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G.
Int. J. Commun. Syst., 2016

Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G.
Int. J. Commun. Syst., 2016

A novel pre-cache schema for high performance Android system.
Future Gener. Comput. Syst., 2016

Human localization based on inertial sensors and fingerprints in the Industrial Internet of Things.
Comput. Networks, 2016

Cost Reduction for Data Allocation in Heterogenous Cloud Computing Using Dynamic Programming.
Proceedings of the Smart Computing and Communication, 2016

Security and Privacy Issues: A Survey on FinTech.
Proceedings of the Smart Computing and Communication, 2016

Optimal Big Data Sharing Approach for Tele-Health in Cloud Computing.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Privacy-Preserving Adaptive Multi-channel Communications Under Timing Constraints.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Traffic big data based path planning strategy in public vehicle systems.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Smart Energy-Aware Data Allocation for Heterogeneous Memory.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

On harmonic fixed-priority scheduling of periodic real-time tasks with constrained deadlines.
Proceedings of the 53rd Annual Design Automation Conference, 2016

An Analysis of Information Security Event Managers.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing Environment.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

An Analysis of Server-Side Design for Seed-Based Mobile Authentication.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Keystroke Biometric User Verification Using Hidden Markov Model.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

A capacity improving and energy saving scheduling scheme in push-based converged wireless broadcasting and cellular networks.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2016

Impact of Cyber-Attacks on Critical Infrastructure.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Information Security Policy for E-Commerce in Saudi Arabia.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Thermal Modeling and Management of Storage Systems in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Software defined healthcare networks.
IEEE Wirel. Commun., 2015

Data Allocation for Hybrid Memory With Genetic Algorithm.
IEEE Trans. Emerg. Top. Comput., 2015

Defending jamming attack in wide-area monitoring system for smart grid.
Telecommun. Syst., 2015

Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm.
IEEE Trans. Computers, 2015

Software Defined Mobile Cloudlet.
Mob. Networks Appl., 2015

High reliable real-time bandwidth scheduling for virtual machines with hidden Markov predicting in telehealth platform.
Future Gener. Comput. Syst., 2015

Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure.
Future Gener. Comput. Syst., 2015

Improving phasor data concentrators reliability for smart grid.
Trans. Emerg. Telecommun. Technol., 2015

An LS-Decomposition Approach for Robust Data Recovery in Wireless Sensor Networks.
CoRR, 2015

Editorial: Green Energy Management and Smart Grid.
Comput. J., 2015

A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

SwapBench: The Easy Way to Demystify Swapping in Mobile Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Data-Oriented Method for Scheduling Dependent Tasks on High-Density Multi-GPU Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Improved Classifier Chain Algorithm for Multi-label Classification of Big Data Analysis.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Design and Architecture of Dell Acceleration Appliances for Database (DAAD): A Practical Approach with High Availability Guaranteed.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

On Resource Scheduling of Wireless Converged Broadcasting and Cellular Networks with Popular Services Being Preferentially Delivered.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

User-Level Side Channel Attack on Workflow System in Data-Center.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Low-Power Sensor Polling for Context-Aware Services on Smartphones.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Head Record Cache Structure to Improve the Operations on Big Files in Cloud Storage Servers.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Cost Minimization for Heterogeneous Systems with Gaussian Distribution Execution Time.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Modeling for CPU-Intensive Applications in Cloud Computing.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Inferring Information Propagation over Online Social Networks: Edge Asymmetry and Flow Tendency.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Cross-Domain Sentiment Analysis of Product Reviews by Combining Lexicon-Based and Learn-Based Techniques.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Fast Numerical Evaluation for Symbolic Expressions in Java.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Optimization for Communication Energy Efficiency of Air-Based Information Network While Satisfying Timing Constraints.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Optimizing Tasks Assignment on Heterogeneous Multi-core Real-Time Systems with Minimum Energy.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Performance and Power Analysis of High-Density Multi-GPGPU Architectures: A Preliminary Case Study.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Electronic Health Record Error Prevention Approach Using Ontology in Big Data.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Minimizing Update Bits of NVM-Based Main Memory Using Bit Flipping and Cyclic Shifting.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Efficient Data Selection Policy for Search Engine Cache Management.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

TERN: A Self-Adjusting Thermal Model for Dynamic Resource Provisioning in Data Centers.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Authentication and Identification Methods Used in Keystroke Biometric Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency.
Proceedings of the Sixth International Green and Sustainable Computing Conference, 2015

Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An Investigation on Cyber Security Threats and Security Models.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Energy Optimization of Air-Based Information Network with Guaranteed Security Protection.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Understanding Model Risk Management - Model Rationalization in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

CLMRS: Designing Cross-LAN Media Resources Sharing Based on DLNA.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An SDN-Based Fabric for Flexible Data-Center Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Research on Application Classification Method in Cloud Computing Environment.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

City of White Plains Parking App: Case Study of a Smart City Web Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

An Approach to Minimize Crossings in Phylogenetic Trees.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Resource scheduling for hybrid broadcasting and cellular networks.
Proceedings of the 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2015

2014
A piecewise geometry method for optimizing the motion planning of data mule in tele-health wireless sensor networks.
Wirel. Networks, 2014

Energy Efficient Task Assignment with Guaranteed Probability Satisfying Timing Constraints for Embedded Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Enabling dynamic file I/O path selection at runtime for parallel file system.
J. Supercomput., 2014

Throughput maximization for periodic real-time systems under the maximal temperature constraint.
ACM Trans. Embed. Comput. Syst., 2014

Sensor virtualization for underwater event detection.
J. Syst. Archit., 2014

Thermal Modeling and Analysis of Cloud Data Storage Systems.
J. Commun., 2014

Low-Power Low-Latency Data Allocation for Hybrid Scratch-Pad Memory.
IEEE Embed. Syst. Lett., 2014

Enabling Cloud Computing in Emergency Management Systems.
IEEE Cloud Comput., 2014

Energy-aware routing for delay-sensitive underwater wireless sensor networks.
Sci. China Inf. Sci., 2014

A Cloud Trust Authority Framework for Mobile Enterprise Information System.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Wear-leveling for PCM main memory on embedded system via page management and process scheduling.
Proceedings of the 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014

A scalable embedded system for massive medical signal processing.
Proceedings of the IEEE 12th International New Circuits and Systems Conference, 2014

Online Data Allocation for Hybrid Memories on Embedded Tele-health Systems.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Sentiment analysis on Weibo data.
Proceedings of the IEEE Computers, 2014

Energy efficient scheduling with probability and task migration considerations for soft real-time systems.
Proceedings of the IEEE Computers, 2014

TOPS: Two-phase scheduling for distributed real-time systems.
Proceedings of the IEEE Computers, 2014

2013
BER-based Power Scheduling in Wireless Sensor Networks.
J. Signal Process. Syst., 2013

Guest Editorial: Green and Cloud Computing.
J. Signal Process. Syst., 2013

Algorithms to Minimize Data Transfer for Code Update on Wireless Sensor Network.
J. Signal Process. Syst., 2013

Extending Amdahl's law and Gustafson's law by evaluating interconnections on multi-core processors.
J. Supercomput., 2013

Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads.
ACM Trans. Embed. Comput. Syst., 2013

A RF4CE-based remote controller with interactive graphical user interface applied to home automation system.
ACM Trans. Embed. Comput. Syst., 2013

Data Placement and Duplication for Embedded Multicore Systems With Scratch Pad Memory.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013

SPM-aware scheduling for nested loops in CMP systems.
SIGBED Rev., 2013

Performance effects of pipeline architecture on an FPGA-based binary32 floating point multiplier.
Microprocess. Microsystems, 2013

Informer homed routing fault tolerance mechanism for wireless sensor networks.
J. Syst. Archit., 2013

Clustering scheduling for hardware tasks in reconfigurable computing systems.
J. Syst. Archit., 2013

A decentralized approach for mining event correlations in distributed system monitoring.
J. Parallel Distributed Comput., 2013

Security-aware optimization for ubiquitous computing systems with SEAT graph approach.
J. Comput. Syst. Sci., 2013

Energy-Efficient Soft Real-Time Scheduling for Parameter Estimation in WSNs.
Int. J. Distributed Sens. Networks, 2013

A Case Study of Sensor Data Collection and Analysis in Smart City: Provenance in Smart Food Supply Chain.
Int. J. Distributed Sens. Networks, 2013

An Probability-Based Energy Model on Cache Coherence Protocol with Mobile Sensor Network.
Int. J. Distributed Sens. Networks, 2013

An adaptive energy-conserving strategy for parallel disk systems.
Future Gener. Comput. Syst., 2013

Design and Optimization of Traffic Balance Broker for Cloud-Based Telehealth Platform.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

An FPGA Based PCI-E Root Complex Architecture for Standalone SOPCs.
Proceedings of the 21st IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2013

A Multi-order Markov Chain Based Scheme for Anomaly Detection.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Cost Minimization with HPDFG and Data Mining for Heterogeneous DSP.
J. Signal Process. Syst., 2012

Three-Phase Algorithms for Task Scheduling in Distributed Mobile DSP System with Lifetime Constraints.
J. Signal Process. Syst., 2012

H<sub>∞</sub> State Estimation for Discrete-Time Chaotic Systems Based on a Unified Model.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Properties of message forwarding paths in social-aware disconnected mobile networks.
Simul., 2012

Low-Cost H.264/AVC Inter Frame Mode Decision Algorithm for Mobile Communication Systems.
Mob. Networks Appl., 2012

Randomized execution algorithms for smart cards to resist power analysis attacks.
J. Syst. Archit., 2012

Three-phase time-aware energy minimization with DVFS and unrolling for Chip Multiprocessors.
J. Syst. Archit., 2012

A hierarchical reliability-driven scheduling algorithm in grid systems.
J. Parallel Distributed Comput., 2012

Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability.
J. Parallel Distributed Comput., 2012

Online optimization for scheduling preemptable tasks on IaaS cloud systems.
J. Parallel Distributed Comput., 2012

On-Line Predictive Thermal Management Under Peak Temperature Constraints for Practical Multi-Core Platforms.
J. Low Power Electron., 2012

Secure wireless communication system for smart grid with rechargeable electric vehicles.
IEEE Commun. Mag., 2012

Balance of security strength and energy for a PMU monitoring system in smart grid.
IEEE Commun. Mag., 2012

Modeling and Power Evaluation of On-Chip Router Components in Spintronics.
Proceedings of the 2012 Sixth IEEE/ACM International Symposium on Networks-on-Chip (NoCS), 2012

ORCA: An offloading framework for I/O-intensive applications on clusters.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Topology Virtualization for Throughput Maximization on Many-Core Platforms.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Optimizing Scheduling in Embedded CMP Systems with Phase Change Memory.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Intelligent Vehicle Detection and Tracking for Highway Driving.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

A Multiple Priority Queueing Genetic Algorithm for Task Scheduling on Heterogeneous Computing Systems.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Peak Temperature Minimization for Embedded Systems with DVS Transition Overhead Consideration.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Towards Power-Efficient Smartphones by Energy-Aware Dynamic Task Scheduling.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Energy consumption analysis of parallel sorting algorithms running on multicore systems.
Proceedings of the 2012 International Green Computing Conference, 2012

Multicore-Enabled Smart Storage for Clusters.
Proceedings of the 2012 IEEE International Conference on Cluster Computing, 2012

2011
Loop Distribution and Fusion with Timing and Code Size Optimization.
J. Signal Process. Syst., 2011

Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System.
IEEE Trans. Smart Grid, 2011

2011 ACM TODAES best paper award.
ACM Trans. Design Autom. Electr. Syst., 2011

Distributed multi-hop cooperative communication in dense wireless sensor networks.
J. Supercomput., 2011

QoS-Aware Fault-Tolerant Scheduling for Real-Time Tasks on Heterogeneous Clusters.
IEEE Trans. Computers, 2011

Variable assignment and instruction scheduling for processor with multi-module memory.
Microprocess. Microsystems, 2011

Resource allocation robustness in multi-core embedded systems with inaccurate information.
J. Syst. Archit., 2011

Optimal H<sub>∞</sub> fusion filters for a class of discrete-time intelligent systems with time delays and missing measurement.
Neurocomputing, 2011

A Review on Cloud Computing: Design Challenges in Architecture and Security.
J. Comput. Inf. Technol., 2011

Efficient Implementation of Thermal-Aware Scheduler on a Quad-core Processor.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Reliability analysis of an energy-aware RAID system.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

A Secure File Allocation Algorithm for Heterogeneous Distributed Systems.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

Optimal Data Allocation for Scratch-Pad Memory on Embedded Multi-core Systems.
Proceedings of the International Conference on Parallel Processing, 2011

A Novel Energy-Aware Fault Tolerance Mechanism for Wireless Sensor Networks.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

Throughput Maximization for Intel Desktop Platform under the Maximum Temperature Constraint.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

Efficient Pattern Detection for Embedded Optical Bio-sensing System.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Throughput maximization for periodic real-time systems under the maximal temperature constraint.
Proceedings of the 48th Design Automation Conference, 2011

Jamming-resilient multi-radio multi-channel multihop wireless network for smart grid.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Security protection on FPGA against differential power analysis attacks.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

ILP security optimization method for embedded systems with timing constraints.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Battery-aware task scheduling in distributed mobile systems with lifetime constraint.
Proceedings of the 16th Asia South Pacific Design Automation Conference, 2011

2010
Variable Partitioning and Scheduling for MPSoC with Virtually Shared Scratch Pad Memory.
J. Signal Process. Syst., 2010

Dynamic and Leakage Energy Minimization With Soft Real-Time Loop Scheduling and Voltage Assignment.
IEEE Trans. Very Large Scale Integr. Syst., 2010

Exponential H∞ synchronization of general discrete-time chaotic neural networks with or without time delays.
IEEE Trans. Neural Networks, 2010

Feedback Dynamic Algorithms for Preemptable Job Scheduling in Cloud Systems.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Adaptive resource allocation for preemptable jobs in cloud systems.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Energy-Aware Loop Parallelism Maximization for Multi-core DSP Architectures.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal Redundancy.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Reducing write activities on non-volatile memories in embedded CMPs via data migration and recomputation.
Proceedings of the 47th Design Automation Conference, 2010

Revealing Feasibility of FMM on ASIC: Efficient Implementation of N-Body Problem on FPGA.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Robust H∞ fusion filtering for discrete-time nonlinear delayed systems with missing measurement.
Proceedings of the American Control Conference, 2010

Hybrid of Job Sequencing and DVFS for Peak Temperature Reduction with Nondeterministic Applications.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Impacts of Inaccurate Information on Resource Allocation for Multi-Core Embedded Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Energy-Aware Loop Scheduling and Assignment for Multi-Core, Multi-Functional-Unit Architecture.
J. Signal Process. Syst., 2009

Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems.
ACM Trans. Design Autom. Electr. Syst., 2009

Low-Power, Intelligent Sensor Hardware Interface for Medical Data Preprocessing.
IEEE Trans. Inf. Technol. Biomed., 2009

Static Security Optimization for Real Time Systems.
IEEE Trans. Ind. Informatics, 2009

Loop scheduling and bank type assignment for heterogeneous multi-bank memory.
J. Parallel Distributed Comput., 2009

Optimizing parallelism for nested loops with iterational and instructional retiming.
J. Embed. Comput., 2009

Energy minimization for heterogeneous wireless sensor networks.
J. Embed. Comput., 2009

Online energy-saving algorithm for sensor networks in dynamic changing environments.
J. Embed. Comput., 2009

A Discrete Dynamic Voltage and Frequency Scaling Algorithm Based on Task Graph Unrolling for Multiprocessor System.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Heterogeneous real-time embedded software optimization considering hardware platform.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Voltage Assignment for Soft Real-Time Embedded Systems with Continuous Probability Distribution.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

Energy Aware Loop Scheduling for High Performance Multi-Module Memory.
Proceedings of the NPC 2009, 2009

H<sub>infinity</sub> Synchronization of General Discrete-Time Chaotic Neural Networks with Time Delays.
Proceedings of the Advances in Neural Networks, 2009

Multi-sensor Optimal H<sub>infinity</sub> Fusion Filters for a Class of Nonlinear Intelligent Systems with Time Delays.
Proceedings of the Advances in Neural Networks, 2009

Global Variable Partition with Virtually Shared Scratch Pad Memory to Minimize Schedule Length.
Proceedings of the ICPPW 2009, 2009

Energy Minimization and Latency Hiding for Heterogeneous Parallel Memory.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Minimizing Memory Access Schedule for Memories.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

ILP optimal scheduling for multi-module memory.
Proceedings of the 7th International Conference on Hardware/Software Codesign and System Synthesis, 2009

Loop Fusion Technique with Minimal Memory Cost via Retiming.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

2008
Timing optimization via nest-loop pipelining considering code size.
Microprocess. Microsystems, 2008

Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP.
J. Parallel Distributed Comput., 2008

Minimizing Transferred Data for Code Update on Wireless Sensor Network.
Proceedings of the Wireless Algorithms, 2008

Key Establishment in Multi-core Parallel Systems.
Proceedings of the MSN 2008, 2008

Energy saving for memory with loop scheduling and prefetching.
Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, 2008

Jamming ACK Attack to Wireless Networks and a Mitigation Approach.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Loop scheduling and assignment to minimize energy while hiding latency for heterogeneous multi-bank memory.
Proceedings of the FPL 2008, 2008

Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Effective Loop Partitioning and Scheduling under Memory and Register Dual Constraints.
Proceedings of the Design, Automation and Test in Europe, 2008

Intelligent Search Agent for Internet Computing with Fuzzy Approach.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

QoS for Networked Heterogeneous Real-Time Embedded Systems.
Proceedings of the ISCA 21st International Conference on Parallel and Distributed Computing and Communication Systems, 2008

2007
Voltage Assignment with Guaranteed Probability Satisfying Timing Constraint for Real-time Multiproceesor DSP.
J. VLSI Signal Process., 2007

Real-Time Dynamic Voltage Loop Scheduling for Multi-Core Embedded Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2007

Energy-Aware Online Algorithm to Satisfy Sampling Rates with Guaranteed Probability for Sensor Applications.
Proceedings of the High Performance Computing and Communications, 2007

Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

2006
Usability in mobile interface browsing.
Web Intell. Agent Syst., 2006

Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software.
IEEE Trans. Computers, 2006

Design optimization and space minimization considering timing and code size via retiming and unfolding.
Microprocess. Microsystems, 2006

Loop Scheduling with Complete Memory Latency Hiding on Multi-core Architecture.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Loop Striping: Maximize Parallelism for Nested Loops.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

Efficent Algorithm of Energy Minimization for Heterogeneous Wireless Sensor Network.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

Voltage Assignment and Loop Scheduling for Energy Minimization while Satisfying Timing Constraint with Guaranteed Probability.
Proceedings of the 2006 IEEE International Conference on Application-Specific Systems, 2006

2005
Multimedia layout adaptation through grammatical specifications.
Multim. Syst., 2005

Optimal Assignment with Guaranteed Confidence Probability for Trees on Heterogeneous DSP Systems.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Maximum Loop Distribution and Fusion for Two-level Loops Considering Code Size.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Optimizing Nested Loops with Iterational and Instructional Retiming.
Proceedings of the Embedded and Ubiquitous Computing, 2005

Loop Distribution and Fusion with Timing and Code Size Optimization for Embedded DSPs.
Proceedings of the Embedded and Ubiquitous Computing, 2005

2004
An Empirical Study of Web Interface Design on Small Display Devices.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

2003
Spatial graph grammars for web information transformation.
Proceedings of the 2003 IEEE Symposium on Human Centric Computing Languages and Environments (HCC 2003), 2003

Authoring multimedia documents through grammatical specifications.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003


  Loading...