Fog Computing: Platform and Applications S Yi, Z Hao, Z Qin, Q Li Hot Topics in Web Systems and Technologies (HotWeb), 2015 | 1052 | 2015 |
Security and Privacy Issues of Fog Computing: A Survey S Yi, Z Qin, Q Li International Conference on Wireless Algorithms, Systems, and Applications …, 2015 | 669 | 2015 |
IMDGuard: Securing implantable medical devices with the external wearable guardian F Xu, Z Qin, CC Tan, B Wang, Q Li 2011 Proceedings IEEE INFOCOM, 1862-1870, 2011 | 316 | 2011 |
Securing SDN infrastructure of IoT–fog networks from MitM attacks C Li, Z Qin, E Novak, Q Li IEEE Internet of Things Journal 4 (5), 1156-1164, 2017 | 143 | 2017 |
Mobiplay: A remote execution based record-and-replay tool for mobile applications Z Qin, Y Tang, E Novak, Q Li Proceedings of the 38th International Conference on Software Engineering …, 2016 | 91 | 2016 |
GlassGesture: Exploring Head Gesture Interface of Smart Glasses S Yi, Z Qin, E Novak, Y Yin, Q Li INFOCOM, 2016 Proceedings IEEE, 2016 | 89 | 2016 |
Dependence of the proton beam drift velocity on the proton core plasma beta in the solar wind CY Tu, E Marsch, ZR Qin Journal of Geophysical Research 109 (A5), A05101, 2004 | 73 | 2004 |
Defending Against Cooperative Attacks in Cooperative Spectrum Sensing Z Qin, Q Li, G Hsieh IEEE Transactions on Wireless Communications 12 (6), 2680 - 2687, 2013 | 53 | 2013 |
Solar wind parameters for magnetospheric magnetic field modeling Z Qin, RE Denton, NA Tsyganenko, S Wolf Space Weather 5 (11), 2007 | 50 | 2007 |
Defending Against Unidentifiable Attacks in Electric Power Grids Z Qin, Q Li, M Chuah IEEE Transactions on Parallel and Distributed Systems 24 (10), 1961 - 1971, 2013 | 43 | 2013 |
Preserving Secondary Users’ Privacy in Cognitive Radio Networks Z Qin, S Yi, Q Li, D Zamkov INFOCOM, 2014 Proceedings IEEE, 2014 | 36 | 2014 |
Unidentifiable Attacks in the Electric Power System Z Qin, Q Li, MC Chuah Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber …, 2012 | 35 | 2012 |
An ELU Network with Total Variation for Image Denoising T Wang, Z Qin, M Zhu International Conference on Neural Information Processing, 2017 | 27 | 2017 |
WearLock: Unlocking Your Phone via Acoustics using Smartwatch S Yi, Z Qin, N Carter, Q Li The 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017 | 22 | 2017 |
High Rate BCI with Portable Devices based on EEG Z Qin, Q Li IEEE/ACM Conference on Connected Health: Applications, Systems and …, 2018 | 16 | 2018 |
Graphical Passwords for Older Computer Users N Carter, E Novak, C Li, Z Qin, Q Li, J Stevens, J Yu HotWeb, 2017 | 14 | 2017 |
User input enrichment via sensing devices Y Tang, Y Li, Q Li, K Sun, H Wang, Z Qin Computer Networks 196, 108262, 2021 | 2 | 2021 |
RoV: receiving files from voice calls using dual-tone multi-frequency method X Zhu, Y Wang, Z Qin The Journal of Supercomputing, 1-17, 2022 | 1 | 2022 |
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS Y Tang, Z Qin, Z Lin, Y Li, S Yi, F Xu, Q Li IEEE Transactions on Computers 71 (12), 3349-3360, 2022 | 1 | 2022 |
Virtual machine migration for IoT applications Y Tang, Z Qin, S Yi, Q Li Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 437-442, 2019 | 1 | 2019 |