Yong Qi
Yong Qi
Verified email at mail.xjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Information potential fields navigation in wireless Ad-Hoc sensor networks
W Wei, Y Qi
Sensors 11 (5), 4794-4807, 2011
1652011
Footprint: detecting Sybil attacks in urban vehicular networks
S Chang, Y Qi, H Zhu, J Zhao, X Shen
IEEE Transactions on Parallel and Distributed Systems 23 (6), 1103-1114, 2011
1332011
Reliable and energy-efficient routing for static wireless ad hoc networks with unreliable links
XY Li, Y Wang, H Chen, X Chu, Y Wu, Y Qi
IEEE Transactions on Parallel and Distributed Systems 20 (10), 1408-1421, 2008
1092008
Season: Shelving interference and joint identification in large-scale RFID systems
L Yang, J Han, Y Qi, C Wang, T Gu, Y Liu
2011 Proceedings IEEE INFOCOM, 3092-3100, 2011
1052011
Detecting malware with an ensemble method based on deep neural network
J Yan, Y Qi, Q Rao
Security and Communication Networks 2018, 2018
952018
Identification-free batch authentication for RFID tags
L Yang, J Han, Y Qi, Y Liu
The 18th IEEE International Conference on Network Protocols, 154-163, 2010
942010
Efficient data aggregation in multi-hop wireless sensor networks under physical interference model
XY Li, XH Xu, SG Wang, SJ Tang, GJ Dai, JZ Zhao, Y Qi
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
932009
D-Pro: Dynamic data center operations with demand-responsive electricity prices in smart grid
P Wang, L Rao, X Liu, Y Qi
IEEE Transactions on Smart Grid 3 (4), 1743-1754, 2012
892012
Joint throughput optimization for wireless mesh networks
XY Li, A Nusairat, Y Wu, Y Qi, JZ Zhao, X Chu, Y Liu
IEEE Transactions on Mobile Computing 8 (7), 895-909, 2008
762008
Randomizing RFID private authentication
Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
642009
Secpod: a framework for virtualization-based security systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 347-360, 2015
572015
Causeinfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems
P Chen, Y Qi, P Zheng, D Hou
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1887-1895, 2014
502014
A novel heuristic algorithm for QoS-aware end-to-end service composition
Y Luo, Y Qi, D Hou, L Shen, Y Chen, X Zhong
Computer Communications 34 (9), 1137-1144, 2011
442011
Run to potential: Sweep coverage in wireless sensor networks
M Xi, K Wu, Y Qi, J Zhao, Y Liu, M Li
2009 International Conference on Parallel Processing, 50-57, 2009
402009
An automatic framework for detecting and characterizing performance degradation of software systems
P Zheng, Y Qi, Y Zhou, P Chen, J Zhan, MRT Lyu
IEEE Transactions on Reliability 63 (4), 927-943, 2014
382014
Design and implementation of SecPod, a framework for virtualization-based security systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017
352017
Frogeye: Perception of the slightest tag motion
L Yang, Y Qi, J Fang, X Ding, T Liu, M Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2670-2678, 2014
352014
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
352013
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
352013
Multi-step ahead time series forecasting for different data patterns based on LSTM recurrent neural network
L Yunpeng, H Di, B Junpeng, Q Yong
2017 14th web information systems and applications conference (WISA), 305-310, 2017
342017
The system can't perform the operation now. Try again later.
Articles 1–20