Clustering approach based on mini batch kmeans for intrusion detection system over big data K Peng, VCM Leung, Q Huang IEEE access 6, 11897-11906, 2018 | 260 | 2018 |
Cost-efficient task scheduling for executing large programs in the cloud S Su, J Li, Q Huang, X Huang, K Shuang, J Wang Parallel Computing 39 (4-5), 177-188, 2013 | 216 | 2013 |
Enhanced energy-efficient scheduling for parallel applications in cloud Q Huang, S Su, J Li, P Xu, K Shuang, X Huang 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012 | 148 | 2012 |
A survey on mobile edge computing: Focusing on service adoption and provision K Peng, VCM Leung, X Xu, L Zheng, J Wang, Q Huang Wireless Communications and Mobile Computing 2018 (1), 8267838, 2018 | 115 | 2018 |
Cost-conscious scheduling for large graph processing in the cloud J Li, S Su, X Cheng, Q Huang, Z Zhang 2011 IEEE international conference on high performance computing and …, 2011 | 105 | 2011 |
Using multi-features and ensemble learning method for imbalanced malware classification Y Zhang, Q Huang, X Ma, Z Yang, J Jiang 2016 IEEE Trustcom/BigDataSE/ISPA, 965-973, 2016 | 73 | 2016 |
Prediction-based dynamic resource scheduling for virtualized cloud systems Q Huang, K Shuang, P Xu, J Li, X Liu, S Su Journal of Networks 9 (2), 375, 2014 | 51 | 2014 |
Reducing operational costs through consolidation with resource prediction in the cloud J Li, K Shuang, S Su, Q Huang, P Xu, X Cheng, J Wang 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012 | 41 | 2012 |
Migration-based elastic consolidation scheduling in cloud data center Q Huang, S Su, S Xu, J Li, P Xu, K Shuang 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 30 | 2013 |
Based on multi-features and clustering ensemble method for automatic malware categorization Y Zhang, C Rong, Q Huang, Y Wu, Z Yang, J Jiang 2017 IEEE Trustcom/BigDataSE/ICESS, 73-82, 2017 | 27 | 2017 |
A comprehensive study of co-residence threat in multi-tenant public paas clouds W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu Information and Communications Security: 18th International Conference …, 2016 | 22 | 2016 |
Enhanced energy-efficient scheduling for parallel tasks using partial optimal slacking S Su, Q Huang, J Li, X Cheng, P Xu, K Shuang The Computer Journal 58 (2), 246-257, 2015 | 22 | 2015 |
Energy‐and Resource‐Aware Computation Offloading for Complex Tasks in Edge Environment K Peng, B Zhao, S Xue, Q Huang Complexity 2020 (1), 9548262, 2020 | 14 | 2020 |
Security-Aware computation offloading for Mobile edge computing-Enabled smart city K Peng, P Liu, P Tao, Q Huang Journal of Cloud Computing 10 (1), 47, 2021 | 8 | 2021 |
A light-weight and accurate method of static integer-overflow-to-buffer-overflow vulnerability detection M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019 | 8 | 2019 |
Findevasion: an effective environment-sensitive malware detection system for the cloud X Jia, G Zhou, Q Huang, W Zhang, D Tian Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017 …, 2018 | 8 | 2018 |
Non-transferable blockchain-based identity authentication Y Fu, J Shao, Q Huang, Q Zhou, H Feng, X Jia, R Wang, W Feng Peer-to-Peer Networking and Applications 16 (3), 1354-1364, 2023 | 6 | 2023 |
ET-GAN: cross-language emotion transfer based on cycle-consistent generative adversarial networks X Jia, J Tai, H Zhou, Y Li, W Zhang, H Du, Q Huang ECAI 2020, 2038-2045, 2020 | 5 | 2020 |
Seef-aldr: A speaker embedding enhancement framework via adversarial learning based disentangled representation J Tai, X Jia, Q Huang, W Zhang, H Du, S Zhang Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 4 | 2020 |
Using the Rgb Image of Machine Code to Classify the Malware J Chen, X Jia, C Zhao, W Zhang, Q Huang 2020 IEEE 5th International Conference on Cloud Computing and Big Data …, 2020 | 2 | 2020 |