Fine-grained database field search using attribute-based encryption for e-healthcare clouds C Guo, R Zhuang, Y Jie, Y Ren, T Wu, KKR Choo Journal of medical systems 40, 1-8, 2016 | 113 | 2016 |
Flexible service selection with user-specific QoS support in service-oriented architecture L Zhao, Y Ren, M Li, K Sakurai Journal of Network and Computer Applications 35 (3), 962-973, 2012 | 113 | 2012 |
Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems L Zhao, Y Ren, Y Xiang, K Sakurai 2010 IEEE 12th International Conference on High Performance Computing and …, 2010 | 112 | 2010 |
Deep reinforcement learning for multimedia traffic control in software defined networking X Huang, T Yuan, G Qiao, Y Ren IEEE Network 32 (6), 35-41, 2018 | 105 | 2018 |
Reliable workflow scheduling with less resource redundancy L Zhao, Y Ren, K Sakurai Parallel Computing 39 (10), 567-585, 2013 | 88 | 2013 |
A similarity metric method of obfuscated malware using function-call graph M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren, N Zheng Journal of Computer Virology and Hacking Techniques 9, 35-47, 2013 | 69 | 2013 |
Cyberbullying detection in social media text based on character‐level convolutional neural network with shortcuts N Lu, G Wu, Z Zhang, Y Zheng, Y Ren, KKR Choo Concurrency and Computation: Practice and Experience 32 (23), e5627, 2020 | 63 | 2020 |
User influence analysis for github developer social networks Y Hu, S Wang, Y Ren, KKR Choo Expert Systems with Applications 108, 108-118, 2018 | 57 | 2018 |
Behavior-based reputation management in P2P file-sharing networks X Fan, M Li, J Ma, Y Ren, H Zhao, Z Su Journal of Computer and System Sciences 78 (6), 1737-1750, 2012 | 36 | 2012 |
A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems L Zhao, Y Ren, K Sakurai 2011 IEEE international conference on advanced information networking and …, 2011 | 31 | 2011 |
A recovery approach for SQLite history recorders from YAFFS2 B Wu, M Xu, H Zhang, J Xu, Y Ren, N Zheng Information and Communication Technology: International Conference, ICT …, 2013 | 30 | 2013 |
A Forensic Analysis Method for Redis Database based on RDB and AOF File. M Xu, X Xu, J Xu, Y Ren, H Zhang, N Zheng J. Comput. 9 (11), 2538-2544, 2014 | 26 | 2014 |
Black-box adversarial attacks on XSS attack detection model Q Wang, H Yang, G Wu, KKR Choo, Z Zhang, G Miao, Y Ren Computers & Security 113, 102554, 2022 | 24 | 2022 |
SPS and DPS: Two new grid-based source location privacy protection schemes in wireless sensor networks Q Wang, J Zhan, X Ouyang, Y Ren Sensors 19 (9), 2074, 2019 | 22 | 2019 |
Heterogeneous investment in spatial public goods game with mixed strategy H Ding, Y Zhang, Y Ren, B Shi, KKR Choo Soft Computing 22 (4), 1287–1294, 2018 | 21 | 2018 |
A File Fragment Classification Method Based on Grayscale Image. T Xu, M Xu, Y Ren, J Xu, H Zhang, N Zheng J. Comput. 9 (8), 1863-1870, 2014 | 21 | 2014 |
Subsidy strategy based on history information can stimulate voluntary vaccination behaviors on seasonal diseases H Ding, JH Xu, Z Wang, YZ Ren, GH Cui Physica A: Statistical Mechanics and its Applications 503, 390-399, 2018 | 20 | 2018 |
Novel threshold changeable secret sharing schemes based on polynomial interpolation L Yuan, M Li, C Guo, KKR Choo, Y Ren PloS one 11 (10), e0165512, 2016 | 20 | 2016 |
Reputation-based investment helps to optimize group behaviors in spatial lattice networks H Ding, L Cao, Y Ren, KKR Choo, B Shi PloS one 11 (9), e0162781, 2016 | 20 | 2016 |
Voluntary vaccination through self-organizing behaviors on locally-mixed social networks B Shi, H Qiu, W Niu, Y Ren, H Ding, D Chen Scientific reports 7 (1), 2665, 2017 | 19 | 2017 |