Mingchu Li
Orcid: 0000-0001-7969-6415Affiliations:
- Dalian University of Technology, School of Software, Dalian, China
- Tianjin University, Department of Computer Science and Technology, Tianjin, China
- University of Toronto, Department of Mathematics, Toronto, Canada (PhD 1997)
According to our database1,
Mingchu Li
authored at least 248 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Ind. Informatics, November, 2024
DDPG-based optimal task placement strategy for computation offloading in green mobile edge networks.
Peer Peer Netw. Appl., July, 2024
Automated Identification of the Retinogeniculate Visual Pathway Using a High-Dimensional Tractography Atlas.
IEEE Trans. Cogn. Dev. Syst., June, 2024
A secure color image dual watermarking combining block feature modulation and voting mechanism for authentication and copyright protection.
Multim. Tools Appl., May, 2024
A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction.
Multim. Tools Appl., April, 2024
Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks.
Comput. Networks, January, 2024
CoRR, 2024
Learning-driven service caching in MEC networks with bursty data traffic and uncertain delays.
Comput. Networks, 2024
Federated deep learning models for detecting RPL attacks on large-scale hybrid IoT networks.
Comput. Networks, 2024
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Graph Reinforcement Learning Based Multi-Hotspot Region UAV Dynamic Scheduling in Mobile Edge Computing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Anatomy-Guided Fiber Trajectory Distribution Estimation for Cranial Nerves Tractography.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024
Joint Dynamic Role Switching Scheme and Cooperative Task Offloading Optimization for UAV Swarm-Enabled Edge Computing.
Proceedings of the International Joint Conference on Neural Networks, 2024
Offloading DNN Tasks Based on Graph Reinforcement Learning in Client-Edge-Cloud Environment.
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
A novel zero-watermarking algorithm based on multi-feature and DNA encryption for medical images.
Multim. Tools Appl., September, 2023
MADDPG-based joint optimization of task partitioning and computation resource allocation in mobile edge computing.
Neural Comput. Appl., August, 2023
Independent tasks scheduling of collaborative computation offloading for SDN-powered MEC on 6G networks.
Soft Comput., July, 2023
Axioms, February, 2023
HierFedML: Aggregator Placement and UE Assignment for Hierarchical Federated Learning in Mobile Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2023
Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks.
J. Supercomput., 2023
A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment.
Reliab. Eng. Syst. Saf., 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Dynamic Offloading Based on Meta Deep Reinforcement Learning and Load Prediction in Smart Home Edge Computing.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter Wave.
Proceedings of the 2nd International Conference on Networks, 2023
Proceedings of the 2nd International Conference on Networks, 2023
Proceedings of the 2nd International Conference on Networks, 2023
Proceedings of the 2nd International Conference on Networks, 2023
Proceedings of the 2nd International Conference on Networks, 2023
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
2022
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks.
IEEE/ACM Trans. Netw., 2022
ACM Trans. Internet Techn., 2022
Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers.
Reliab. Eng. Syst. Saf., 2022
Aerial-Aerial-Ground Computation Offloading Using High Altitude Aerial Vehicle and Mini-drones.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Schedule or Wait: Age-Minimization for IoT Big Data Processing in MEC via Online Learning.
Proceedings of the IEEE INFOCOM 2022, 2022
Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Dynamic Service Placement Algorithm for Partitionable Applications in Mobile Edge Computing.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
2021
A Cyber Physical System Crowdsourcing Inference Method Based on Tempering: An Advancement in Artificial Intelligence Algorithms.
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Comput. Soc. Syst., 2021
An Upstream-Reciprocity-Based Strategy for Academic Social Networks Using Public Goods Game.
IEEE Trans. Comput. Soc. Syst., 2021
A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy.
Reliab. Eng. Syst. Saf., 2021
Resource Allocation Scheduling Algorithm Based on Incomplete Information Dynamic Game for Edge Computing.
Int. J. Web Serv. Res., 2021
A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information.
Int. Trans. Oper. Res., 2021
Generalized lump solutions, classical lump solutions and rogue waves of the (2+1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada-like equation.
Appl. Math. Comput., 2021
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
A scenario-based simultaneous game approach for risk-averse facility protection problem.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption.
IEEE Trans. Serv. Comput., 2020
Variational Channel Estimation with Tempering: An Artificial Intelligence Algorithm for Wireless Intelligent Networks.
Sensors, 2020
A game-theoretic approach for channel security against active time-varying attacks based on artificial noise.
J. Ambient Intell. Humaniz. Comput., 2020
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020
Int. J. Inf. Commun. Technol., 2020
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields.
Multim. Tools Appl., 2019
Mob. Networks Appl., 2019
RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks.
Knowl. Based Syst., 2019
实时嵌入式系统的WCET分析与预测研究综述 (Survey of WCET Analysis and Prediction for Real-time Embedded Systems).
计算机科学, 2019
J. Ambient Intell. Humaniz. Comput., 2019
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019
IEEE Access, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
2018
Sci. Program., 2018
Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing.
Pervasive Mob. Comput., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
J. Parallel Distributed Comput., 2018
Future Gener. Comput. Syst., 2018
Spanning 3-ended trees in quasi-claw-free graphs.
Ars Comb., 2018
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping.
IEEE Access, 2018
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
Proceedings of the IEEE International Conference on Agents, 2018
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018
Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing Systems.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
IEEE Trans. Parallel Distributed Syst., 2017
Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism.
ACM Trans. Internet Techn., 2017
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference.
Peer-to-Peer Netw. Appl., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network.
KSII Trans. Internet Inf. Syst., 2017
Effective hybrid load scheduling of online and offline clusters for e-health service.
Neurocomputing, 2017
An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings.
Future Internet, 2017
SRTS : A Self-Recoverable Time Synchronization for sensor networks of healthcare IoT.
Comput. Networks, 2017
Comput. Electr. Eng., 2017
A hierarchical combinatorial testing method for smart phone software in wearable IoT systems.
Comput. Electr. Eng., 2017
Spanning 3-ended trees in k-connected claw-free graphs.
Ars Comb., 2017
Multi-Reciprocity Policies Co-Evolution Based Incentive Evaluating Framework for Mobile P2P Systems.
IEEE Access, 2017
IEEE Access, 2017
Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV.
IEEE Access, 2017
Optimal patrol strategies against attacker's persistent attack with multiple resources.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
Sensors, 2016
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem.
Multim. Tools Appl., 2016
Knowl. Based Syst., 2016
Hamiltonian properties of almost locally connected claw-free graphs.
Ars Comb., 2016
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
2015
ACM Trans. Web, 2015
Sensors, 2015
Reversible data hiding exploiting high-correlation regulation for high-quality images.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Energy-efficient quality of service aware forwarding scheme for Content-Centric Networking.
J. Netw. Comput. Appl., 2015
Int. J. Distributed Sens. Networks, 2015
Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective.
Concurr. Comput. Pract. Exp., 2015
[r, s, t]-colorings of fans.
Ars Comb., 2015
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage.
Proceedings of the 12th International Conference on Information Technology, 2015
Proceedings of the Intelligent and Evolutionary Systems - The 19th Asia Pacific Symposium, 2015
RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
2014
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters.
KSII Trans. Internet Inf. Syst., 2014
Impact of Duty Cycle and Radio Range Irregularity on Localization Algorithms for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014
2013
J. Supercomput., 2013
Secur. Commun. Networks, 2013
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Inf. Secur., 2013
Reversible data hiding for high quality images exploiting interpolation and direction order mechanism.
Digit. Signal Process., 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the Advanced Parallel Processing Technologies, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
Signal Process., 2012
Secur. Commun. Networks, 2012
Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Netw. Comput. Appl., 2012
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012
J. Comput. Syst. Sci., 2012
A Game Theoretic Resource Allocation Model Based on Extended Second Price Sealed Auction in Grid Computing.
J. Comput., 2012
Inf. Sci., 2012
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Int. J. Comput. Intell. Syst., 2012
A proportional fairness backoff scheme for funnelling effect in wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2012
Concurr. Comput. Pract. Exp., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Research and simulation of transport protocols optimization on wireless multi-hop networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
2011
A formal separation method of protocols to eliminate parallel attacks in virtual organization.
Secur. Commun. Networks, 2011
Secur. Commun. Networks, 2011
J. Networks, 2011
J. Inf. Hiding Multim. Signal Process., 2011
J. Graph Theory, 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors.
Proceedings of IEEE International Conference on Communications, 2011
2010
Knowl. Based Syst., 2010
J. Syst. Softw., 2010
J. Inf. Hiding Multim. Signal Process., 2010
J. Commun., 2010
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid.
Int. J. Inf. Process. Manag., 2010
Supereulerian index is stable under contractions and closures.
Ars Comb., 2010
Spanning eulerian subgraphs in N<sup>2</sup>-locally connected claw-free graphs.
Ars Comb., 2010
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010
Proceedings of the Symposia and Workshops on Ubiquitous, 2010
A Novel Grid Resource Scheduling Model Based on Extended Second Price Sealed Auction.
Proceedings of the Third International Symposium on Parallel Architectures, 2010
Proceedings of the Third International Symposium on Parallel Architectures, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
J. Syst. Softw., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Discret. Math., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009
2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Linear Polynomial-Time Algorithms To Construct 4-Connected 4-Regular Locally Connected Claw-Free Graphs.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Using Gavish-Grave LP to Formulate the Directed Black and White Traveling Salesman Problem.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the AI 2007: Advances in Artificial Intelligence, 2007
2006
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
J. Graph Theory, 2005
Electron. Notes Discret. Math., 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
2004
Proceedings of the Visualization and Data Analysis 2004, 2004
Proceedings of the Third International Conference on Image and Graphics, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Human Vision and Electronic Imaging IX, 2004
Proceedings of the Conference on Three-Dimensional Image Capture and Applications VI, 2004
2003
Circumferences of 2-Connected Claw-Free Graphs.
Ars Comb., 2003
2002
Hamiltonian Cycles in N<sup>2</sup>-Locally Connected Claw-Free Graphs.
Ars Comb., 2002
2001
2000
Discret. Math., 2000
1998
On Pancyclic Claw-Free Graphs.
Ars Comb., 1998
1996
1995
1994
1993