Weizhe Zhang

Orcid: 0000-0003-4783-876X

According to our database1, Weizhe Zhang authored at least 238 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
EVRM: Elastic Virtual Resource Management framework for cloud virtual instances.
Future Gener. Comput. Syst., 2025

2024
Mobility-Aware Cooperative Service Caching for Mobile Augmented Reality Services in Mobile Edge Computing.
IEEE Trans. Veh. Technol., November, 2024

Backdoor Two-Stream Video Models on Federated Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2024

Two-Stage Client Selection for Federated Learning Against Free-Riding Attack: A Multiarmed Bandits and Auction-Based Approach.
IEEE Internet Things J., October, 2024

Lightweight Single-Stage Ship Object Detection Algorithm for Unmanned Surface Vessels Based on Improved YOLOv5.
Sensors, September, 2024

Minimizing Service Latency Through Image-Based Microservice Caching and Randomized Request Routing in Mobile Edge Computing.
IEEE Internet Things J., September, 2024

Topic-aware Masked Attentive Network for Information Cascade Prediction.
ACM Trans. Asian Low Resour. Lang. Inf. Process., August, 2024

QoS and Fairness Oriented Dynamic Computation Offloading in the Internet of Vehicles Based on Estimate Time of Arrival.
IEEE Trans. Veh. Technol., July, 2024

Multi-Source and Multi-modal Deep Network Embedding for Cross-Network Node Classification.
ACM Trans. Knowl. Discov. Data, July, 2024

CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts.
IEEE Trans. Software Eng., June, 2024

Cooperative Service Caching in Vehicular Edge Computing Networks Based on Transportation Correlation Analysis.
IEEE Internet Things J., June, 2024

Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on FPGA.
IEEE/ACM Trans. Netw., April, 2024

Decentralized AI-Based Task Distribution on Blockchain for Cloud Industrial Internet of Things.
J. Grid Comput., March, 2024

Adaptive asynchronous federated learning.
Future Gener. Comput. Syst., March, 2024

Model-Free GPU Online Energy Optimization.
IEEE Trans. Sustain. Comput., 2024

DRLCAP: Runtime GPU Frequency Capping With Deep Reinforcement Learning.
IEEE Trans. Sustain. Comput., 2024

Multi-Attribute Auction-Based Grouped Federated Learning.
IEEE Trans. Serv. Comput., 2024

On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing".
IEEE Trans. Inf. Forensics Secur., 2024

Generating Location Traces With Semantic- Constrained Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

On the Security of Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

An IoT Device Identification Method Using Extracted Fingerprint From Sequence of Traffic Grayscale Images.
IEEE Trans. Dependable Secur. Comput., 2024

Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts.
Proc. ACM Softw. Eng., 2024

A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts.
IET Blockchain, 2024

MPSU-Net: Quantitative interpretation algorithm for road cracks based on multiscale feature fusion and superimposed U-Net.
Digit. Signal Process., 2024

How to Bridge Spatial and Temporal Heterogeneity in Link Prediction? A Contrastive Method.
CoRR, 2024

DIP: Diffusion Learning of Inconsistency Pattern for General DeepFake Detection.
CoRR, 2024

SmartReco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp Analysis.
CoRR, 2024

MCGMark: An Encodable and Robust Online Watermark for LLM-Generated Malicious Code.
CoRR, 2024

Towards Bridging the Cross-modal Semantic Gap for Multi-modal Recommendation.
CoRR, 2024

Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools.
CoRR, 2024

PointAttentionVLAD: A Two-Stage Self-Attention Network for Point Cloud-Based Place Recognition Task.
IEEE Access, 2024

FRADE: Forgery-aware Audio-distilled Multimodal Learning for Deepfake Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

An MTD-driven Hybrid Defense Method Against DDoS Based on Markov Game in Multi-controller SDN-enabled IoT Networks.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

BitMatcher: Bit-level Counter Adjustment for Sketches.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

How to Bridge Graph and Sequence Patterns in Session-Based Recommendation? A Self-Supervised Method.
Proceedings of the IEEE International Conference on Acoustics, 2024

Bubble Sketch: A High-performance and Memory-efficient Sketch for Finding Top-<i>k</i> Items in Data Streams.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking.
IEEE Trans. Netw. Serv. Manag., December, 2023

MSDS: A Novel Framework for Multi-Source Data Selection Based Cross-Network Node Classification.
IEEE Trans. Knowl. Data Eng., December, 2023

Hierarchical Clustering Based on Dendrogram in Sustainable Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023

Smart-DNN+: A Memory-efficient Neural Networks Compression Framework for the Model Inference.
ACM Trans. Archit. Code Optim., December, 2023

Memory sharing for handling memory overload on physical machines in cloud data centers.
J. Cloud Comput., December, 2023

Predicting information diffusion using the inter- and intra-path of influence transitivity.
Inf. Sci., December, 2023

FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems.
Cybersecur., December, 2023

BP Neural Network Modeling and Solving Acceleration of Analog ICs.
Circuits Syst. Signal Process., December, 2023

TDTA: Topology-Based Real-Time DAG Task Allocation on Identical Multiprocessor Platforms.
IEEE Trans. Parallel Distributed Syst., November, 2023

A Model-Based Method for Enabling Source Mapping and Intrusion Detection on Proprietary Can Bus.
IEEE Trans. Intell. Transp. Syst., November, 2023

A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things.
IEEE Internet Things J., October, 2023

Progressive-fidelity computation of the genetic algorithm for energy-efficient virtual machine placement in cloud data centers.
Appl. Soft Comput., October, 2023

PDA-GNN: propagation-depth-aware graph neural networks for recommendation.
World Wide Web (WWW), September, 2023

Dependable federated learning for IoT intrusion detection against poisoning attacks.
Comput. Secur., September, 2023

Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization.
Comput. Commun., September, 2023

A blockchain-based privacy-preserving advertising attribution architecture: Requirements, design, and a prototype implementation.
Softw. Pract. Exp., August, 2023

Automatic IoT device identification: a deep learning based approach using graphic traffic characteristics.
Telecommun. Syst., June, 2023

SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction.
J. Inf. Secur. Appl., June, 2023

An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing.
Expert Syst. J. Knowl. Eng., June, 2023

Efficient intrusion detection toward IoT networks using cloud-edge collaboration.
Comput. Networks, June, 2023

An Edge Server Placement Algorithm Based on Graph Convolution Network.
IEEE Trans. Veh. Technol., April, 2023

Auction-Based Cluster Federated Learning in Mobile Edge Computing Systems.
IEEE Trans. Parallel Distributed Syst., April, 2023

High-Efficiency Multiobjective Synchronous Modeling and Solution of Analog ICs.
Circuits Syst. Signal Process., April, 2023

K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing.
Clust. Comput., April, 2023

Accelerated computation of the genetic algorithm for energy-efficient virtual machine placement in data centers.
Neural Comput. Appl., March, 2023

Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.
Comput. J., March, 2023

Explainable AI in big data intelligence of community detection for digitalization e-healthcare services.
Appl. Soft Comput., March, 2023

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things.
Clust. Comput., February, 2023

DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments.
Clust. Comput., February, 2023

Mapping and embedding infrastructure resource management in software defined networks.
Clust. Comput., February, 2023

Adversarial ELF Malware Detection Method Using Model Interpretation.
IEEE Trans. Ind. Informatics, 2023

A Multi-Objective Virtual Network Migration Algorithm Based on Reinforcement Learning.
IEEE Trans. Cloud Comput., 2023

A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

A transformer-based approach for improving app review response generation.
Softw. Pract. Exp., 2023

An intelligent energy-efficient approach for managing IoE tasks in cloud platforms.
J. Ambient Intell. Humaniz. Comput., 2023

Paired Swarm Optimized Relational Vector Learning for FDI Attack Detection in IoT-Aided Smart Grid.
IEEE Internet Things J., 2023

ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning.
CoRR, 2023

An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers.
Comput. Commun., 2023

A Mixed Lubrication Model for Predicting the Lubrication Performance Degradation Behavior of Slipper Pair in Early Wear Failure.
IEEE Access, 2023

Multi-behavior Enhanced Graph Neural Networks for Social Recommendation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Multi-modal Graph and Sequence Fusion Learning for Recommendation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

A Representation Learning Link Prediction Approach Using Line Graph Neural Networks.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

FleCom: A Flexible Congestion Control Protocol in Named Data Networking.
Proceedings of the IEEE INFOCOM 2023, 2023

Accelerated Genetic Algorithm with Population Control for Energy-Aware Virtual Machine Placement in Data Centers.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

PCLive: Bringing Named Data Networking to Internet Livestreaming.
Proceedings of the 10th ACM Conference on Information-Centric Networking, 2023

2022
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., December, 2022

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities.
Microprocess. Microsystems, April, 2022

Repeatable Multi-Dimensional Virtual Network Embedding in Cloud Service Platform.
IEEE Trans. Serv. Comput., 2022

Dynamic GPU Energy Optimization for Machine Learning Training Workloads.
IEEE Trans. Parallel Distributed Syst., 2022

Online Power Management for Multi-Cores: A Reinforcement Learning Based Approach.
IEEE Trans. Parallel Distributed Syst., 2022

Optimizing Depthwise Separable Convolution Operations on GPUs.
IEEE Trans. Parallel Distributed Syst., 2022

Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones.
ACM Trans. Sens. Networks, 2022

Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security.
ACM Trans. Internet Techn., 2022

FLAS: Computation and Communication Efficient Federated Learning via Adaptive Sampling.
IEEE Trans. Netw. Sci. Eng., 2022

Efficient Lane-Level Map Building via Vehicle-Based Crowdsourcing.
IEEE Trans. Intell. Transp. Syst., 2022

Two-Phase Industrial Manufacturing Service Management for Energy Efficiency of Data Centers.
IEEE Trans. Ind. Informatics, 2022

A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors.
IEEE Trans. Circuits Syst. Video Technol., 2022

Blockchain-Based Decentralized Public Auditing for Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Improving Interference Analysis for Real-Time DAG Tasks Under Partitioned Scheduling.
IEEE Trans. Computers, 2022

Corrigendum to 'Evading generated-image detectors: A deep dithering approach' [Signal Processing 197(2022) 108558].
Signal Process., 2022

Evading generated-image detectors: A deep dithering approach.
Signal Process., 2022

NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN).
Int. J. Mach. Learn. Cybern., 2022

Traffic flow control using multi-agent reinforcement learning.
J. Netw. Comput. Appl., 2022

You are what the permissions told me! Android malware detection based on hybrid tactics.
J. Inf. Secur. Appl., 2022

MTGK: Multi-source cross-network node classification via transferable graph knowledge.
Inf. Sci., 2022

A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization.
IACR Cryptol. ePrint Arch., 2022

A co-occurrence matrix based masquerade detection method in in-vehicle network.
Trans. Emerg. Telecommun. Technol., 2022

A Robust Image Steganographic Scheme against General Scaling Attacks.
CoRR, 2022

Adversarial malware sample generation method based on the prototype of deep learning detector.
Comput. Secur., 2022

VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems.
Sci. China Inf. Sci., 2022

Using honeypots to model botnet attacks on the internet of medical things.
Comput. Electr. Eng., 2022

Lie group manifold analysis: an unsupervised domain adaptation approach for image classification.
Appl. Intell., 2022

Automatic Fault Detection and Diagnosis in Cellular Networks and Beyond 5G: Intelligent Network Management.
Algorithms, 2022

DNN Real-Time Collaborative Inference Acceleration with Mobile Edge Computing.
Proceedings of the International Joint Conference on Neural Networks, 2022

Efficient Private Set Intersection Based on Functional Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Low latency internet livestreaming in named data networking.
Proceedings of the 9th ACM Conference on Information-Centric Networking, 2022

2021
Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms.
Wirel. Networks, 2021

Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things.
Wirel. Commun. Mob. Comput., 2021

Multitier Service Migration Framework Based on Mobility Prediction in Mobile Edge Computing.
Wirel. Commun. Mob. Comput., 2021

Fine-Grained Powercap Allocation for Power-Constrained Systems Based on Multi-Objective Machine Learning.
IEEE Trans. Parallel Distributed Syst., 2021

FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis.
IEEE Trans. Netw. Sci. Eng., 2021

Automatic translation of data parallel programs for heterogeneous parallelism through OpenMP offloading.
J. Supercomput., 2021

Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach.
IEEE Trans. Intell. Transp. Syst., 2021

Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents.
IEEE Trans. Inf. Forensics Secur., 2021

Efficient Hybrid Central Processing Unit/ Input-Output Resource Scheduling for Virtual Machines.
IEEE Trans. Ind. Electron., 2021

Correction to "An Efficient and Secured Framework For Mobile Cloud Computing".
IEEE Trans. Cloud Comput., 2021

An Efficient and Secured Framework for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2021

EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements.
Secur. Commun. Networks, 2021

CL-ADMM: A Cooperative-Learning-Based Optimization Framework for Resource Management in MEC.
IEEE Internet Things J., 2021

Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems.
IEEE Internet Things J., 2021

An Evolutionary Study of IoT Malware.
IEEE Internet Things J., 2021

Asynchronous Channel-Hopping Sequences With the Best Maximum-Time-to-Rendezvous and Period for Cognitive-Radio Wireless Networks.
IEEE Commun. Lett., 2021

SAMLDroid: A Static Taint Analysis and Machine Learning Combined High-Accuracy Method for Identifying Android Apps with Location Privacy Leakage Risks.
Entropy, 2021

Auction Based Clustered Federated Learning in Mobile Edge Computing System.
CoRR, 2021

Node-Fusion: Topology-aware virtual network embedding algorithm for repeatable virtual network mapping over substrate nodes.
Concurr. Comput. Pract. Exp., 2021

Optimal priority assignment for messages on controller area network with maximum system robustness.
Concurr. Comput. Pract. Exp., 2021

Kalman prediction-based virtual network experimental platform for smart living.
Comput. Commun., 2021

Managing overloaded hosts for energy-efficiency in cloud data centers.
Clust. Comput., 2021

Simultaneous application assignment and virtual machine placement via ant colony optimization for energy-efficient enterprise data centers.
Clust. Comput., 2021

RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything.
IEEE Consumer Electron. Mag., 2021

A Novel Android Malware Detection Method Based on Visible User Interface.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Smart-DNN: Efficiently Reducing the Memory Requirements of Running Deep Neural Networks on Resource-constrained Platforms.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

MHCNC: A Novel Framework for Multi-Source Heterogeneous Cross-Network Node Classification.
Proceedings of the IEEE Global Communications Conference, 2021

HFL-DP: Hierarchical Federated Learning with Differential Privacy.
Proceedings of the IEEE Global Communications Conference, 2021

2020
An adaptive heuristic for managing energy consumption and overloaded hosts in a cloud data center.
Wirel. Networks, 2020

Energy-Latency Tradeoff for Dynamic Computation Offloading in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2020

DAMBA: Detecting Android Malware by ORGB Analysis.
IEEE Trans. Reliab., 2020

Performance Optimization for Relative-Error-Bounded Lossy Compression on Scientific Data.
IEEE Trans. Parallel Distributed Syst., 2020

Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks.
IEEE Trans. Netw. Serv. Manag., 2020

Speeding Up the Schedulability Analysis and Priority Assignment of Sporadic Tasks Under Uniprocessor FPNS.
IEEE Trans. Ind. Informatics, 2020

OODT: Obstacle Aware Opportunistic Data Transmission for Cognitive Radio Ad Hoc Networks.
IEEE Trans. Commun., 2020

Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing.
IEEE Trans. Cloud Comput., 2020

Network perception task migration in cloud-edge fusion computing.
J. Cloud Comput., 2020

An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks.
IEEE Internet Things J., 2020

Multi-metric domain adaptation for unsupervised transfer learning.
IET Image Process., 2020

Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes.
Future Gener. Comput. Syst., 2020

A Cooperative Learning Framework for Resource Management in MEC: An ADMM Perspective.
CoRR, 2020

The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020

Energy-efficiency virtual machine placement based on binary gravitational search algorithm.
Clust. Comput., 2020

Big Data-Driven Cognitive Computing System for Optimization of Social Media Analytics.
IEEE Access, 2020

Double-Wing Mixture of Experts for Streaming Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Delta-DNN: Efficiently Compressing Deep Neural Networks via Exploiting Floats Similarity.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

HomoPAI: A Secure Collaborative Machine Learning Platform based on Homomorphic Encryption.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Malware Classification Method Based on Word Vector of Bytes and Multilayer Perception.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Optimizing GPU Memory Transactions for Convolution Operations.
Proceedings of the IEEE International Conference on Cluster Computing, 2020

2019
Linear and dynamic programming algorithms for real-time task scheduling with task duplication.
J. Supercomput., 2019

Automatic generation of benchmarks for I/O-intensive parallel applications.
J. Parallel Distributed Comput., 2019

Performance modeling for MPI applications with low overhead fine-grained profiling.
Future Gener. Comput. Syst., 2019

Resource allocation and computation offloading with data security for mobile edge computing.
Future Gener. Comput. Syst., 2019

An Ant Colony System for energy-efficient dynamic Virtual Machine Placement in data centers.
Expert Syst. Appl., 2019

Algorithm of web page similarity comparison based on visual block.
Comput. Sci. Inf. Syst., 2019

Energy Consumption in Point-Coverage Wireless Sensor Networks via Bat Algorithm.
IEEE Access, 2019

Accelerating Relative-error Bounded Lossy Compression for HPC datasets with Precomputation-Based Mechanisms.
Proceedings of the 35th Symposium on Mass Storage Systems and Technologies, 2019

Multi-Parameter Performance Modeling Based on Machine Learning with Basic Block Features.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Human-Object Contour for Action Recognition with Attentional Multi-modal Fusion Network.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

Accelerating Lossy Compression on HPC Datasets via Partitioning Computation for Parallel Processing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

PROFPRED: A Compiler-Level IR Based Performance Prediction Framework for MPI Industrial Applications.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

RLS-VNE: Repeatable Large-Scale Virtual Network Embedding over Substrate Nodes.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Negotiation Game Model for Big Data Transactions.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
A New Method of Priority Assignment for Real-Time Flows in the WirelessHART Network by the TDMA Protocol.
Sensors, 2018

Demadroid: Object Reference Graph-Based Malware Detection in Android.
Secur. Commun. Networks, 2018

Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability.
Multim. Tools Appl., 2018

A novel lossless recovery algorithm for basic matrix-based VSS.
Multim. Tools Appl., 2018

A novel mapping-based lossless recovery algorithm for VSS.
J. Real Time Image Process., 2018

Adaptive Energy-Aware Algorithms for Minimizing Energy Consumption and SLA Violation in Cloud Computing.
IEEE Access, 2018

Classification of Holoscopic 3D Micro-Gesture Images and Videos.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018

Automatic Generation of Review Content in Specific Domain of Social Network Based on RNN.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
<i>MeReg</i>: Managing Energy-SLA Tradeoff for Green Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2017

Profile-based dynamic application assignment with a repairing genetic algorithm for greener data centers.
J. Supercomput., 2017

Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server.
IEEE Trans. Cloud Comput., 2017

Homomorphic Visual Cryptography.
J. Inf. Hiding Multim. Signal Process., 2017

A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS.
Int. J. Digit. Crime Forensics, 2017

Network-aware virtual machine migration in an overcommitted cloud.
Future Gener. Comput. Syst., 2017

Predicting HPC parallel program performance based on LLVM compiler.
Clust. Comput., 2017

MuMs: Energy-Aware VM Selection Scheme for Cloud Data Center.
Proceedings of the 28th International Workshop on Database and Expert Systems Applications, 2017

2016
Exploring large-scale small file storage for search engines.
J. Supercomput., 2016

Communication optimization for RDMA-based science data transmission tools.
J. Supercomput., 2016

Optimization strategy of Hadoop small file storage for big data in healthcare.
J. Supercomput., 2016

DwarfCode: A Performance Prediction Tool for Parallel Applications.
IEEE Trans. Computers, 2016

Android platform-based individual privacy information protection system.
Pers. Ubiquitous Comput., 2016

Sentiment classification technology based on Markov logic networks.
New Rev. Hypermedia Multim., 2016

Special Issue on Real-Time Scheduling on Heterogeneous Multi-core Processors.
Microprocess. Microsystems, 2016

A Trusted Real-Time Scheduling Model for Wireless Sensor Networks.
J. Sensors, 2016

Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks.
J. Sensors, 2016

2015
Solving Energy-Aware Real-Time Tasks Scheduling Problem with Shuffled Frog Leaping Algorithm on Heterogeneous Platforms.
Sensors, 2015

Xen-based virtual honeypot system for smart device.
Multim. Tools Appl., 2015

Dynamic load balancing technology for cloud-oriented CDN.
Comput. Sci. Inf. Syst., 2015

A Novel (2, 2) Visual Secret Sharing without the Pixel Expansion.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
Global Smooth Solutions in R<sup>3</sup> to Short Wave-Long Wave Interactions Systems for Viscous Compressible Fluids.
SIAM J. Math. Anal., 2014

Identifying and evaluating the internet opinion leader community based on k-clique clustering.
Neural Comput. Appl., 2014

PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform.
Int. J. Distributed Sens. Networks, 2014

Detecting bad information in mobile wireless networks based on the wireless application protocol.
Computing, 2014

Automatic generation of I/O kernels for HPC applications.
Proceedings of the 9th Parallel Data Storage Workshop, 2014

2013
Data Spoofing Attacks by IPv6 Tunnels.
IEICE Trans. Commun., 2013

A performance prediction scheme for computation-intensive applications on cloud.
Proceedings of IEEE International Conference on Communications, 2013

2012
Improving the QoS of Web Applications across Multiple Virtual Machines in Cloud Computing Environment.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Performance Prediction for MPI Parallel Jobs.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012

2011
Exploring Social Relations for Personalized Tag Recommendation in Social Tagging Systems.
IEICE Trans. Inf. Syst., 2011

2010
Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs.
J. Comput., 2010

Unsupervised Tag Sense Disambiguation in Folksonomies.
J. Comput., 2010

Incorporating Relevance and Importance for Dynamic Ranking in Folksonomies.
J. Convergence Inf. Technol., 2010

Exploring Web Partition in DHT-Based Distributed Web Crawling.
IEICE Trans. Inf. Syst., 2010

Efficient Distributed Web Crawling Utilizing Internet Resources.
IEICE Trans. Inf. Syst., 2010

Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

A General Distributed Object Locating Architecture in the Internet of Things.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Speak the same language with your friends: augmenting tag recommenders with social relations.
Proceedings of the HT'10, 2010

Ontology emergence from folksonomies.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Measurement and Analysis of BitTorrent Availability.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Forwarding-Based Task Scheduling Algorithm for Distributed Web Crawling over DHTs.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2006
A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints.
J. Comput. Res. Dev., 2006

Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments.
Sci. China Ser. F Inf. Sci., 2006

Multisite co-allocation algorithms for computational grid.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Fast Detection of Worm Infection for Large-Scale Networks.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

Topology-Based Macroscopical Response and Control Technology for Network Security Event.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Multisite Resource Selection and Scheduling Algorithm on Computational Grid.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Complexity Analysis of Load Balance Problem for Synchronous Iterative Applications.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Multisite Task Scheduling on Distributed Computing Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...