Energy-efficient target coverage in wireless sensor networks M Cardei, MT Thai, Y Li, W Wu Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 1391 | 2005 |
Collective data-sanitization for preventing sensitive information inference attacks in social networks Z Cai, Z He, X Guan, Y Li IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016 | 634 | 2016 |
Distributed data aggregation scheduling in wireless sensor networks B Yu, J Li, Y Li IEEE INFOCOM 2009, 2159-2167, 2009 | 341 | 2009 |
Cost-efficient strategies for restraining rumor spreading in mobile social networks Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016 | 304 | 2016 |
Minimum connected dominating sets and maximal independent sets in unit disk graphs W Wu, H Du, X Jia, Y Li, SCH Huang Theoretical Computer Science 352 (1-3), 1-7, 2006 | 286 | 2006 |
Nearly constant approximation for data aggregation scheduling in wireless sensor networks SCH Huang, PJ Wan, CT Vu, Y Li, F Yao IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 271 | 2007 |
A greedy approximation for minimum connected dominating sets L Ruan, H Du, X Jia, W Wu, Y Li, KI Ko Theoretical Computer Science 329 (1-3), 325-330, 2004 | 269 | 2004 |
Deep learning based inference of private information using embedded sensors in smart devices Y Liang, Z Cai, J Yu, Q Han, Y Li IEEE Network 32 (4), 8-14, 2018 | 267 | 2018 |
Wireless sensor networks and applications Y Li, MT Thai Springer Science & Business Media, 2008 | 259 | 2008 |
On greedy construction of connected dominating sets in wireless networks Y Li, MT Thai, F Wang, CW Yi, PJ Wan, DZ Du Wireless Communications and Mobile Computing 5 (8), 927-932, 2005 | 253 | 2005 |
Sparse target counting and localization in sensor networks based on compressive sensing B Zhang, X Cheng, N Zhang, Y Cui, Y Li, Q Liang 2011 Proceedings IEEE INFOCOM, 2255-2263, 2011 | 240 | 2011 |
Constructing minimum connected dominating sets with bounded diameters in wireless networks D Kim, Y Wu, Y Li, F Zou, DZ Du IEEE Transactions on Parallel and Distributed Systems 20 (2), 147-157, 2008 | 226 | 2008 |
Data linkage in smart internet of things systems: a consideration from a privacy perspective X Zheng, Z Cai, Y Li IEEE Communications Magazine 56 (9), 55-61, 2018 | 220 | 2018 |
Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems N Xiong, AV Vasilakos, LT Yang, L Song, Y Pan, R Kannan, Y Li IEEE Journal on Selected Areas in Communications 27 (4), 495-509, 2009 | 203 | 2009 |
Using crowdsourced data in location-based social networks to explore influence maximization JLZ Cai, M Yan, Y Li IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 201 | 2016 |
Follow but no track: Privacy preserved profile publishing in cyber-physical social systems X Zheng, Z Cai, J Yu, C Wang, Y Li IEEE Internet of Things Journal 4 (6), 1868-1878, 2017 | 165 | 2017 |
Maximum lifetime of sensor networks with adjustable sensing range A Dhawan, CT Vu, A Zelikovsky, Y Li, SK Prasad Seventh ACIS International Conference on Software Engineering, Artificial …, 2006 | 125 | 2006 |
Approximate holistic aggregation in wireless sensor networks J Li, S Cheng, Z Cai, J Yu, C Wang, Y Li ACM Transactions on Sensor Networks (TOSN) 13 (2), 1-24, 2017 | 118 | 2017 |
Construction algorithms for k-connected m-dominating sets in wireless sensor networks Y Wu, Y Li Proceedings of the 9th ACM international symposium on Mobile ad hoc …, 2008 | 118 | 2008 |
Localized construction of connected dominating set in wireless networks YLS Zhu, MTDZ Du Proceedings of US National Science Foundation International Workshop …, 2004 | 114 | 2004 |