Extreme learning machines [trends & controversies] E Cambria, GB Huang, LLC Kasun, H Zhou, CM Vong, J Lin, J Yin, Z Cai, ... IEEE intelligent systems 28 (6), 30-59, 2013 | 443 | 2013 |
Security and privacy in the medical internet of things: a review W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang Security and Communication Networks 2018 (1), 5978636, 2018 | 341 | 2018 |
A survey on edge computing systems and tools F Liu, G Tang, Y Li, Z Cai, X Zhang, T Zhou Proceedings of the IEEE 107 (8), 1537-1562, 2019 | 309 | 2019 |
Data processing and text mining technologies on electronic medical records: a review W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang Journal of healthcare engineering 2018 (1), 4302425, 2018 | 305 | 2018 |
Network intrusion detection through stacking dilated convolutional autoencoders Y Yu, J Long, Z Cai Security and Communication Networks 2017 (1), 4184196, 2017 | 183 | 2017 |
Computation-efficient offloading and trajectory scheduling for multi-UAV assisted mobile edge computing J Zhang, L Zhou, F Zhou, BC Seet, H Zhang, Z Cai, J Wei IEEE Transactions on Vehicular Technology 69 (2), 2114-2125, 2019 | 180 | 2019 |
Cloze test helps: Effective video anomaly detection via learning to complete video events G Yu, S Wang, Z Cai, E Zhu, C Xu, J Yin, M Kloft Proceedings of the 28th ACM international conference on multimedia, 583-591, 2020 | 166 | 2020 |
Flow level detection and filtering of low-rate DDoS C Zhang, Z Cai, W Chen, X Luo, J Yin Computer Networks 56 (15), 3417-3431, 2012 | 158 | 2012 |
Virtual network embedding for evolving networks Z Cai, F Liu, N Xiao, Q Liu, Z Wang 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 158 | 2010 |
A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities H Teng, Y Liu, A Liu, NN Xiong, Z Cai, T Wang, X Liu Future Generation Computer Systems 94, 351-367, 2019 | 142 | 2019 |
Deep fusion clustering network W Tu, S Zhou, X Liu, X Guo, Z Cai, E Zhu, J Cheng Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9978-9987, 2021 | 128 | 2021 |
RRED: robust RED algorithm to counter low-rate denial-of-service attacks C Zhang, J Yin, Z Cai, W Chen IEEE Communications Letters 14 (5), 489-491, 2010 | 126 | 2010 |
Consensus one-step multi-view subspace clustering P Zhang, X Liu, J Xiong, S Zhou, W Zhao, E Zhu, Z Cai IEEE Transactions on Knowledge and Data Engineering 34 (10), 4676-4689, 2020 | 124 | 2020 |
Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu, Z Cai Journal of Parallel and Distributed Computing 135, 140-155, 2020 | 104 | 2020 |
A survey on security‐aware measurement in SDN H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang Security and Communication Networks 2018 (1), 2459154, 2018 | 100 | 2018 |
Edge computing: platforms, applications and challenges Z Zhao, F Liu, Z Cai, N Xiao Journal of Computer Research and Development 55 (2), 327-337, 2018 | 95 | 2018 |
Counter tree: A scalable counter architecture for per-flow traffic measurement M Chen, S Chen, Z Cai IEEE/ACM Transactions on Networking 25 (2), 1249-1262, 2016 | 88 | 2016 |
Securing display path for security-sensitive applications on mobile devices J Cui, Y Zhang, Z Cai, A Liu, Y Li Computers, Materials and Continua 55 (1), 17, 2018 | 81 | 2018 |
Su-ids: A semi-supervised and unsupervised framework for network intrusion detection E Min, J Long, Q Liu, J Cui, Z Cai, J Ma Cloud Computing and Security: 4th International Conference, ICCCS 2018 …, 2018 | 78 | 2018 |
Adversarial training based lattice LSTM for Chinese clinical named entity recognition S Zhao, Z Cai, H Chen, Y Wang, F Liu, A Liu Journal of biomedical informatics 99, 103290, 2019 | 75 | 2019 |