From QoS to QoE: A tutorial on video quality assessment Y Chen, K Wu, Q Zhang IEEE Communications Surveys & Tutorials 17 (2), 1126-1165, 2014 | 391 | 2014 |
Macro-femto heterogeneous network deployment and management: from business models to technical solutions P Lin, J Zhang, Y Chen, Q Zhang IEEE wireless communications 18 (3), 64-70, 2011 | 197 | 2011 |
Privacy-preserving collaborative deep learning with unreliable participants L Zhao, Q Wang, Q Zou, Y Zhang, Y Chen IEEE Transactions on Information Forensics and Security 15, 1486-1500, 2019 | 180 | 2019 |
Utility-aware refunding framework for hybrid access femtocell network Y Chen, J Zhang, Q Zhang IEEE Transactions on Wireless Communications 11 (5), 1688-1697, 2012 | 132 | 2012 |
Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones Q Wang, X Lin, M Zhou, Y Chen, C Wang, Q Li, X Luo IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2062-2070, 2019 | 117 | 2019 |
Deep learning on mobile and embedded devices: State-of-the-art, challenges, and future directions Y Chen, B Zheng, Z Zhang, Q Wang, C Shen, Q Zhang ACM Computing Surveys (CSUR) 53 (4), 1-37, 2020 | 109 | 2020 |
TAHES: A truthful double auction mechanism for heterogeneous spectrums X Feng, Y Chen, J Zhang, Q Zhang, B Li IEEE Transactions on Wireless Communications 11 (11), 4038-4047, 2012 | 108 | 2012 |
CReam: A smart contract enabled collusion-resistant e-auction S Wu, Y Chen, Q Wang, M Li, C Wang, X Luo IEEE Transactions on Information Forensics and Security 14 (7), 1687-1701, 2018 | 104 | 2018 |
LVID: A multimodal biometrics authentication system on smartphones L Wu, J Yang, M Zhou, Y Chen, Q Wang IEEE Transactions on Information Forensics and Security 15, 1572-1585, 2019 | 88 | 2019 |
Incentivizing crowdsourcing systems with network effects Y Chen, B Li, Q Zhang IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 83 | 2016 |
TAHES: Truthful double auction for heterogeneous spectrums X Feng, Y Chen, J Zhang, Q Zhang, B Li 2012 Proceedings IEEE INFOCOM, 3076-3080, 2012 | 75 | 2012 |
Privacy-preserving collaborative model learning: The case of word vector training Q Wang, M Du, X Chen, Y Chen, P Zhou, X Chen, X Huang IEEE Transactions on Knowledge and Data Engineering 30 (12), 2381-2393, 2018 | 66 | 2018 |
A reverse auction framework for access permission transaction to promote hybrid access in femtocell network Y Chen, J Zhang, Q Zhang, J Jia 2012 Proceedings IEEE INFOCOM, 2761-2765, 2012 | 61 | 2012 |
TAMES: A truthful double auction for multi-demand heterogeneous spectrums Y Chen, J Zhang, K Wu, Q Zhang IEEE Transactions on Parallel and Distributed Systems 25 (11), 3012-3024, 2013 | 58 | 2013 |
A comprehensive survey of the key technologies and challenges surrounding vehicular ad hoc networks Z Xia, J Wu, L Wu, Y Chen, J Yang, PS Yu ACM Transactions on Intelligent Systems and Technology (TIST) 12 (4), 1-30, 2021 | 54 | 2021 |
LOTUS: Location-aware online truthful double auction for dynamic spectrum access Y Chen, P Lin, Q Zhang 2014 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2014 | 51 | 2014 |
Model extraction attacks and defenses on cloud-based machine learning models X Gong, Q Wang, Y Chen, W Yang, X Jiang IEEE Communications Magazine 58 (12), 83-89, 2020 | 49 | 2020 |
Survive and thrive: A stochastic game for DDoS attacks in bitcoin mining pools S Wu, Y Chen, M Li, X Luo, Z Liu, L Liu IEEE/ACM Transactions On Networking 28 (2), 874-887, 2020 | 49 | 2020 |
Tames: A truthful auction mechanism for heterogeneous spectrum allocation Y Chen, J Zhang, K Wu, Q Zhang 2013 Proceedings IEEE INFOCOM, 180-184, 2013 | 49 | 2013 |
Signed-PageRank: An efficient influence maximization framework for signed social networks X Yin, X Hu, Y Chen, X Yuan, B Li IEEE Transactions on Knowledge and Data Engineering 33 (5), 2208-2222, 2019 | 45 | 2019 |