Yong Qi
Yong Qi
Verified email at - Homepage
Cited by
Cited by
Detecting malware with an ensemble method based on deep neural network
J Yan, Y Qi, Q Rao
Security and Communication Networks 2018 (1), 7247095, 2018
Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks
W Wei, Y Qi
Sensors 11, 4794-4807, 2011
Footprint: detecting Sybil attacks in urban vehicular networks
S Chang, Y Qi, H Zhu, J Zhao, X Shen
IEEE Transactions on Parallel and Distributed Systems 23 (6), 1103-1114, 2011
Causeinfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems
P Chen, Y Qi, P Zheng, D Hou
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1887-1895, 2014
Multi-step ahead time series forecasting for different data patterns based on LSTM recurrent neural network
L Yunpeng, H Di, B Junpeng, Q Yong
2017 14th web information systems and applications conference (WISA), 305-310, 2017
Season: Shelving interference and joint identification in large-scale RFID systems
L Yang, J Han, Y Qi, C Wang, T Gu, Y Liu
2011 Proceedings IEEE INFOCOM, 3092-3100, 2011
Reliable and energy-efficient routing for static wireless ad hoc networks with unreliable links
XY Li, Y Wang, H Chen, X Chu, Y Wu, Y Qi
IEEE Transactions on Parallel and Distributed Systems 20 (10), 1408-1421, 2008
D-Pro: Dynamic data center operations with demand-responsive electricity prices in smart grid
P Wang, L Rao, X Liu, Y Qi
IEEE Transactions on Smart Grid 3 (4), 1743-1754, 2012
Identification-free batch authentication for RFID tags
L Yang, J Han, Y Qi, Y Liu
The 18th IEEE International Conference on Network Protocols, 154-163, 2010
Efficient data aggregation in multi-hop wireless sensor networks under physical interference model
XY Li, XH Xu, SG Wang, SJ Tang, GJ Dai, JZ Zhao, Y Qi
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
Joint throughput optimization for wireless mesh networks
XY Li, A Nusairat, Y Wu, Y Qi, JZ Zhao, X Chu, Y Liu
IEEE transactions on mobile computing 8 (7), 895-909, 2008
{SecPod}: a Framework for Virtualization-based Security Systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
2015 USENIX Annual Technical Conference (USENIX ATC 15), 347-360, 2015
Carbon-aware electricity cost minimization for sustainable data centers
H Dou, Y Qi, W Wei, H Song
IEEE Transactions on Sustainable Computing 2 (2), 211-223, 2017
Randomizing RFID private authentication
Q Yao, Y Qi, J Han, J Zhao, X Li, Y Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
CauseInfer: Automated End-to-End Performance Diagnosis with Hierarchical Causality Graph in Cloud Environment
P Chen, Y Qi, D Hou
IEEE transactions on services computing 12 (2), 214-230, 2016
Image super-resolution via channel attention and spatial graph convolutional network
Y Yang, Y Qi
Pattern Recognition 112, 107798, 2021
Design and implementation of SecPod, a framework for virtualization-based security systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017
A novel heuristic algorithm for QoS-aware end-to-end service composition
Y Luo, Y Qi, D Hou, L Shen, Y Chen, X Zhong
Computer Communications 34 (9), 1137-1144, 2011
Shelving interference and joint identification in large-scale RFID systems
L Yang, Y Qi, J Han, C Wang, Y Liu
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3149-3159, 2013
An automatic framework for detecting and characterizing performance degradation of software systems
P Zheng, Y Qi, Y Zhou, P Chen, J Zhan, MRT Lyu
IEEE Transactions on Reliability 63 (4), 927-943, 2014
The system can't perform the operation now. Try again later.
Articles 1–20