Live migration of multiple virtual machines with resource reservation in cloud computing environments K Ye, X Jiang, D Huang, J Chen, B Wang 2011 IEEE 4th International Conference on Cloud Computing, 267-274, 2011 | 238 | 2011 |
Behavior pattern clustering in blockchain networks B Huang, Z Liu, J Chen, A Liu, Q Liu, Q He Multimedia Tools and Applications 76, 20099-20110, 2017 | 114 | 2017 |
V-fuzz: Vulnerability-oriented evolutionary fuzzing Y Li, S Ji, C Lv, Y Chen, J Chen, Q Gu, C Wu arXiv preprint arXiv:1901.01142, 2019 | 72 | 2019 |
Fedrecattack: Model poisoning attack to federated recommendation D Rong, S Ye, R Zhao, HN Yuen, J Chen, Q He 2022 IEEE 38th International Conference on Data Engineering (ICDE), 2643-2655, 2022 | 69 | 2022 |
Non-cooperative games on multidimensional resource allocation D Ye, J Chen Future Generation Computer Systems 29 (6), 1345-1352, 2013 | 65 | 2013 |
Adversarial captchas C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang IEEE transactions on cybernetics 52 (7), 6095-6108, 2021 | 63 | 2021 |
Smartseed: Smart seed generation for efficient fuzzing C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen arXiv preprint arXiv:1807.02606, 2018 | 58 | 2018 |
V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs Y Li, S Ji, C Lyu, Y Chen, J Chen, Q Gu, C Wu, R Beyah IEEE transactions on cybernetics 52 (5), 3745-3756, 2020 | 51 | 2020 |
Virt-LM: a benchmark for live migration of virtual machine D Huang, D Ye, Q He, J Chen, K Ye Proceedings of the 2nd ACM/SPEC International Conference on Performance …, 2011 | 49 | 2011 |
AAGA: Affinity-aware grouping for allocation of virtual machines J Chen, K Chiew, D Ye, L Zhu, W Chen 2013 IEEE 27th International Conference on Advanced Information Networking …, 2013 | 46 | 2013 |
Poisoning deep learning based recommender model in federated learning scenarios D Rong, Q He, J Chen arXiv preprint arXiv:2204.13594, 2022 | 45 | 2022 |
Towards understanding the security of modern image captchas and underground captcha-solving services H Weng, B Zhao, S Ji, J Chen, T Wang, Q He, R Beyah Big Data Mining and Analytics 2 (2), 118-144, 2019 | 42 | 2019 |
Towards evaluating the security of real-world deployed image captchas B Zhao, H Weng, S Ji, J Chen, T Wang, Q He, R Beyah Proceedings of the 11th acm workshop on artificial intelligence and security …, 2018 | 40 | 2018 |
De-sag: On the de-anonymization of structure-attribute graph data S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah IEEE Transactions on Dependable and Secure Computing 16 (4), 594-607, 2017 | 30 | 2017 |
Informed live migration strategies of virtual machines for cluster load balancing X Li, Q He, J Chen, K Ye, T Yin IFIP International Conference on Network and Parallel Computing, 111-122, 2011 | 26 | 2011 |
Rapido: Scaling blockchain with multi-path payment channels C Lin, N Ma, X Wang, J Chen Neurocomputing 406, 322-332, 2020 | 23 | 2020 |
Cats: cross-platform e-commerce fraud detection H Weng, S Ji, F Duan, Z Li, J Chen, Q He, T Wang 2019 ieee 35th international conference on data engineering (icde), 1874-1885, 2019 | 23 | 2019 |
Detecting missed security operations through differential checking of object-based similar paths D Liu, Q Wu, S Ji, K Lu, Z Liu, J Chen, Q He Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 18 | 2021 |
Digital resource rights confirmation and infringement tracking based on smart contracts P Qian, Z Liu, X Wang, J Chen, B Wang, R Zimmermann 2019 IEEE 6th International Conference on Cloud Computing and Intelligence …, 2019 | 18 | 2019 |
Joint affinity aware grouping and virtual machine placement J Chen, Q He, D Ye, W Chen, Y Xiang, K Chiew, L Zhu Microprocessors and Microsystems 52, 365-380, 2017 | 17 | 2017 |