Qianmu Li
Orcid: 0000-0002-0998-1517
According to our database1,
Qianmu Li
authored at least 238 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Cloud Comput., December, 2024
Wirel. Networks, November, 2024
Symmetry, September, 2024
Wirel. Networks, July, 2024
Wirel. Networks, July, 2024
Wirel. Networks, July, 2024
Temporal-aware influence maximization solution in artificial intelligent edge application.
Wirel. Networks, July, 2024
A Deep Learning-Based Method for Preventing Data Leakage in Electric Power Industrial Internet of Things Business Data Interactions.
Sensors, July, 2024
ACM Trans. Intell. Syst. Technol., June, 2024
A Little Truth Injection But a Big Reward: Label Aggregation With Graph Neural Networks.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2024
Neural Comput. Appl., May, 2024
IEEE Trans. Comput. Soc. Syst., February, 2024
Microservice-driven privacy-aware cross-platform social relationship prediction based on sequential information.
Softw. Pract. Exp., January, 2024
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey.
Ad Hoc Networks, January, 2024
Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability.
CoRR, 2024
Robust Model Aggregation for Heterogeneous Federated Learning: Analysis and Optimizations.
CoRR, 2024
TGIEN: An Interpretable Image Editing Method for IoT Applications Based on Text Guidance.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
A Domain-Adaptive Large Language Model With Refinement Framework For IoT Cybersecurity.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the 2024 16th International Conference on Machine Learning and Computing, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Cascading Graph Convolution Contrastive Learning Networks for Multi-behavior Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2024
2023
Future Gener. Comput. Syst., November, 2023
Bandit-based data poisoning attack against federated learning for autonomous driving models.
Expert Syst. Appl., October, 2023
J. King Saud Univ. Comput. Inf. Sci., September, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
J. Inf. Secur. Appl., May, 2023
A privacy-preserving recommendation method with clustering and locality-sensitive hashing.
Comput. Intell., February, 2023
Reflecting the trends in the academic landscape of special education using probabilistic dynamic topic modeling.
Libr. Hi Tech, 2023
Q-learning based strategy analysis of cyber-physical systems considering unequal cost.
Intell. Converged Networks, 2023
Expert Syst. Appl., 2023
Revealing the Trends in the Academic Landscape of the Health Care System Using Contextual Topic Modeling.
Data Intell., 2023
An intelligent recommendation method based on multi-interest network and adversarial deep learning.
Comput. Secur., 2023
Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models.
Aslib J. Inf. Manag., 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Hierarchical Graph Contrastive Learning via Debiasing Noise Samples with Adaptive Repelling Ratio.
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
FDRS: Federated Diversified Recommender System Based on Heterogeneous Graph Convolutional Network.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
MERGE: Multi-Entity Relational Reasoning Based Explanation in Visual Question Answering.
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
SMEF: Social-aware Multi-dimensional Edge Features-based Graph Representation Learning for Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
2022
Time-aware scalable recommendation with clustering-based distributed factorization for edge services.
World Wide Web, 2022
World Wide Web, 2022
Privacy-Aware Factorization-Based Hybrid Recommendation Method for Healthcare Services.
IEEE Trans. Ind. Informatics, 2022
Multi-Sensor Fault Diagnosis Based on Time Series in an Intelligent Mechanical System.
Sensors, 2022
Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data.
J. Organ. End User Comput., 2022
Locality-Sensitive Hashing-Based Link Prediction Process on Smart Campus Education or Online Social Platform.
J. Circuits Syst. Comput., 2022
J. Cloud Comput., 2022
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022
A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Study on the method of identifying diseases with abnormally high signals based on machine learning technology.
Int. J. Inf. Commun. Technol., 2022
Expert Syst. Appl., 2022
Estimating crowd density with edge intelligence based on lightweight convolutional neural networks.
Expert Syst. Appl., 2022
A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things.
Cryptogr., 2022
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Comput. Secur., 2022
AngHNE: Representation Learning for Bipartite Heterogeneous Networks with Angular Loss.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022
Attention-Based Knowledge-aware Multi-Interest Intelligent Model for Sequential Recommendation.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the IEEE Smartworld, 2022
FWC: Fitting Weight Compression Method for Reducing Communication Traffic for Federated Learning.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Evolving convolutional neural networks for intrusion detection system using hybrid multi-strategy aquila optimizer.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
CPGCN: Collaborative Property-aware Graph Convolutional Networks for Service Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2022
2021
An Effective Classification-Based Framework for Predicting Cloud Capacity Demand in Cloud Services.
IEEE Trans. Serv. Comput., 2021
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing.
ACM Trans. Internet Techn., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2021
An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things.
Secur. Commun. Networks, 2021
J. Organ. End User Comput., 2021
Expert Syst. Appl., 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Edge Computing-Enabled Crowd Density Estimation based on Lightweight Convolutional Neural Network.
Proceedings of the IEEE International Smart Cities Conference, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Topic-Attentive Encoder-Decoder with Pre-Trained Language Model for Keyphrase Generation.
Proceedings of the IEEE International Conference on Data Mining, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
J. Supercomput., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Secur. Commun. Networks, 2020
Mob. Networks Appl., 2020
Knowl. Based Syst., 2020
J. Cloud Comput., 2020
Research on automatic annotation of pathological image detail information based on machine learning.
Int. J. Inf. Commun. Technol., 2020
Multiclass imbalanced learning with one-versus-one decomposition and spectral clustering.
Expert Syst. Appl., 2020
EURASIP J. Wirel. Commun. Netw., 2020
A dynamic taint tracking optimized fuzz testing method based on multi-modal sensor data fusion.
EURASIP J. Wirel. Commun. Netw., 2020
An adversarial learning approach for discovering social relations in human-centered information networks.
EURASIP J. Wirel. Commun. Netw., 2020
CoRR, 2020
Temporal-aware and sparsity-tolerant hybrid collaborative recommendation method with privacy preservation.
Concurr. Comput. Pract. Exp., 2020
Security-Driven hybrid collaborative recommendation method for cloud-based iot services.
Comput. Secur., 2020
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Comput. Secur., 2020
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks.
Complex., 2020
Single Magnetic Element-Based High Step-Up Converter for Energy Storage and Photovoltaic System with Reduced Device Count.
Complex., 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Targeted Influence Maximization Based on Cloud Computing Over Big Data in Social Networks.
IEEE Access, 2020
Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 IEEE International Conference on Embedded Software and Systems, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
2019
Quantized dissipative filter design for Markovian switch T-S fuzzy systems with time-varying delays.
Soft Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems.
Future Gener. Comput. Syst., 2019
Entropy, 2019
Time-Aware Gated Recurrent Unit Networks for Road Surface Friction Prediction Using Historical Data.
CoRR, 2019
A fault-tolerant dynamic scheduling method on hierarchical mobile edge cloud computing.
Comput. Intell., 2019
EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain.
IEEE Access, 2019
Safety Risk Monitoring of Cyber-Physical Power Systems Based on Ensemble Learning Algorithm.
IEEE Access, 2019
CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network.
IEEE Access, 2019
Text Mining Techniques to Capture Facts for Cloud Computing Adoption and Big Data Processing.
IEEE Access, 2019
Adaptive Event-Triggered Mixed $H_{\infty}$ and Passivity-Based Filter Design for Nonlinear T-S Fuzzy Markovian Switching Systems With Time-Varying Delays.
IEEE Access, 2019
Proceedings of the Mobile Computing, Applications, and Services, 2019
An Active Defense Model in Edge Computing Based on Network Topology Mimetic Correlation.
Proceedings of the Mobile Computing, Applications, and Services, 2019
Design of Dynamic Analysis and Grammar Generation Method in Industrial Control Protocols Test.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the 3rd International Conference on High Performance Compilation, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Safe Facial Multi-Attribute Feature Fusion Analysis Based on Embedded Multi-Task Learning.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
2018
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents.
Secur. Commun. Networks, 2018
基于单个卷积神经网络的面部多特征点定位 (Facial Multi-landmarks Localization Based on Single Convolution Neural Network).
计算机科学, 2018
Future Gener. Comput. Syst., 2018
Data Min. Knowl. Discov., 2018
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.
CoRR, 2018
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.
CoRR, 2018
Appl. Soft Comput., 2018
Spatial-Temporal Aware Intelligent Service Recommendation Method Based on Distributed Tensor factorization for Big Data Applications.
IEEE Access, 2018
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
IEEE Access, 2018
Temporal-Sparsity Aware Service Recommendation Method via Hybrid Collaborative Filtering Techniques.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018
Multi-class Imbalanced Learning with One-Versus-One Decomposition: An Empirical Study.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.
Wirel. Networks, 2017
Call Admission Control With Inter-Network Cooperation for Cognitive Heterogeneous Networks.
IEEE Trans. Wirel. Commun., 2017
IEEE Trans. Veh. Technol., 2017
Energy-efficient resource allocation for multiuser OFDMA system based on hybrid genetic simulated annealing.
Soft Comput., 2017
基于时变加权马尔科夫链的网络异常检测模型 (Network Anomaly Detection Model Based on Time-varying Weighted Markov Chain).
计算机科学, 2017
一种面向融合泛在网的协同防护体系设计 (Collaborative Protection Architecture Design Orient to Fusion Ubiquitous Network).
计算机科学, 2017
电网融合泛在网信息平台设计及安全威胁分析 (Design and Security Threats Analysis for Information Platform of Fusion Ubiquitous Network in Power Grid).
计算机科学, 2017
基于文化基因算法和最小二乘支持向量机的安全数据特征处理方法 (Feature Processing Approach Based on MA-LSSVM in Safety Data).
计算机科学, 2017
Research on dynamic heuristic scanning technique and the application of the malicious code detection model.
Inf. Process. Lett., 2017
ElasticSim: A Toolkit for Simulating Workflows with Cloud Resource Runtime Auto-Scaling and Stochastic Task Execution Times.
J. Grid Comput., 2017
A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds.
Future Gener. Comput. Syst., 2017
VRer: Context-Based Venue Recommendation using embedded space ranking SVM in location-based social network.
Expert Syst. Appl., 2017
The Proactive Defense of Energy Internet Terminals Edge-Access Using the Network Topology Autoassociation.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2017
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017
2016
IEEE Wirel. Commun. Lett., 2016
Knowl. Based Syst., 2016
一种基于马尔科夫模型的网络安全风险实时分析方法 (Real Time Analysis Method of Network Security Risk Based on Markov Model).
计算机科学, 2016
一种基于攻防图的网络安全防御策略生成方法 (Improved Network Security Defense Strategy Generation Method Based on Attack-Defense Graph).
计算机科学, 2016
基于冗余消除和属性数值化的XACML策略优化方法 (XACML Policy Optimization Method Based on Redundancy Elimination and Attribute Numericalization).
计算机科学, 2016
Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System.
Neurocomputing, 2016
J. Grid Comput., 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
基于增量近邻查询的位置隐私保护方法 (Location Privacy Protection Method Based on Incremental Nearest Neighbor Query).
计算机科学, 2015
计算机科学, 2015
Proportional fair resource allocation based on hybrid ant colony optimization for slow adaptive OFDMA system.
Inf. Sci., 2015
IEEE Commun. Lett., 2015
Resource allocation algorithm based on hybrid particle swarm optimization for multiuser cognitive OFDM network.
Expert Syst. Appl., 2015
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015
Efficient 4D Non-local Tensor Total-Variation for Low-Dose CT Perfusion Deconvolution.
Proceedings of the Medical Computer Vision: Algorithms for Big Data, 2015
2014
Proportional Fair Resource Allocation Based on Chance-Constrained Programming for Cognitive OFDM Network.
Wirel. Pers. Commun., 2014
J. Digit. Inf. Manag., 2014
J. Digit. Inf. Manag., 2014
J. Digit. Inf. Manag., 2014
J. Digit. Inf. Manag., 2014
Exploring the diversity in cluster ensemble generation: Random sampling and random projection.
Expert Syst. Appl., 2014
Expert Syst. Appl., 2014
2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2010
Comput. Electr. Eng., 2010
2008
Comput. Commun., 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2006
Multiagent Grid Syst., 2006
Proceedings of the Neural Information Processing, 13th International Conference, 2006
Proceedings of the Grid and Cooperative Computing, 2006
Proceedings of the Grid and Cooperative Computing, 2006
2005
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005