Serving at the edge: A scalable IoT architecture based on transparent computing J Ren, H Guo, C Xu, Y Zhang IEEE Network 31 (5), 96-105, 2017 | 481 | 2017 |
GANobfuscator: Mitigating information leakage under GAN via differential privacy C Xu, J Ren, D Zhang, Y Zhang, Z Qin, K Ren IEEE Transactions on Information Forensics and Security 14 (9), 2358-2371, 2019 | 255 | 2019 |
A survey on emerging computing paradigms for big data Y Zhang, J Ren, J Liu, C Xu, H Guo, Y Liu Chinese Journal of Electronics 26 (1), 1-12, 2017 | 200 | 2017 |
DPPro: Differentially private high-dimensional data release via random projection C Xu, J Ren, Y Zhang, Z Qin, K Ren IEEE Transactions on Information Forensics and Security 12 (12), 3081-3093, 2017 | 133 | 2017 |
Distilling at the edge: A local differential privacy obfuscation framework for IoT data analytics C Xu, J Ren, D Zhang, Y Zhang IEEE Communications Magazine 56 (8), 20-25, 2018 | 94 | 2018 |
EdgeSanitizer: Locally differentially private deep inference at the edge for mobile data analytics C Xu, J Ren, L She, Y Zhang, Z Qin, K Ren IEEE Internet of Things Journal 6 (3), 5140-5151, 2019 | 51 | 2019 |
Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source Q Liao, G Xiao, CG Xu, Y Xu, Y Guo Physical Review A 102 (3), 032604, 2020 | 49 | 2020 |
Low power fixed priority scheduling sporadic task with shared resources in hard real time systems Y Zhang, C Xu Microprocessors and Microsystems 45, 164-175, 2016 | 18 | 2016 |
Privstream: Enabling privacy-preserving inferences on IoT data stream at the edge D Wang, J Ren, C Xu, J Liu, Z Wang, Y Zhang, X Shen 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 15 | 2019 |
Repair policies of coverage holes based dynamic node activation in wireless sensor networks XH Deng, CG Xu, FY Zhao, Y Liu 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 11 | 2010 |
Repair Policies of Coverage Holes in Wireless Sensor Networks C XU, X DENG, H ZOU Chinese Journal of Sensors and Actuators 2, 256-259, 2010 | 11* | 2010 |
Experimental and theoretical study of authentication request flooding attack on 802.11 WLAN L Chibiao, X Chugui, Q Jinming, L Changjing Energy Procedia 13, 6800-6808, 2011 | 3 | 2011 |
Development of a novel ladle monitoring system based on internet of things technologies CB Liu, MH Zhang, CJ You, CG Xu, BH Zhang, ZF Zhong, CR Wang, ... Journal of Convergence Information Technology 8 (10), 1003, 2013 | 2 | 2013 |
AGQ-MAC:Asynchronous MAC Protocol Based Grid Quorum for Low Duty-cycled Wireless Sensor Networks XU Chugui, D Xiao-heng, LIU Chi-biao, C Zhi-gang Journal of Chinese Computer System 34 (10), 2383-2387, 2013 | 2* | 2013 |
Method to repair coverage holes based on wake-up mechanism in wireless sensor networks CG Xu, XH Deng Jisuanji Yingyong/ Journal of Computer Applications 32 (6), 1516-1518, 2012 | 2 | 2012 |
Energy balanced scheme based on variable cell transmission range for wireless sensor networks X Deng, C Xu, Y Liu 2009 5th International Conference on Wireless Communications, Networking and …, 2009 | 2 | 2009 |
iProps: A comprehensive software tool for protein classification and analysis with automatic machine learning capabilities and model interpretation capabilities C Feng, H Wei, C Xu, B Feng, X Zhu, J Liu, Q Zou IEEE Journal of Biomedical and Health Informatics, 2024 | | 2024 |
A stacking-based algorithm for antifreeze protein identification using combined physicochemical, pseudo amino acid composition, and reduction property features C Feng, H Wei, X Li, B Feng, C Xu, X Zhu, R Liu Computers in Biology and Medicine 176, 108534, 2024 | | 2024 |
An RBF Neural Network Clustering Algorithm Based on K‐Nearest Neighbor J Li, C Xu, Y Liang, G Wu, Z Liang Mathematical Problems in Engineering 2022 (1), 1083961, 2022 | | 2022 |
Design of the mine environment monitoring system based on wireless mesh networks C LIN, C XU Journal of Xinyu University, 2014 | | 2014 |