Adversarial examples: Attacks and defenses for deep learning X Yuan, P He, Q Zhu, X Li IEEE transactions on neural networks and learning systems 30 (9), 2805-2824, 2019 | 2214 | 2019 |
DeepDefense: identifying DDoS attack via deep learning X Yuan, C Li, X Li 2017 IEEE International Conference on Smart Computing (SMARTCOMP), 1-8, 2017 | 496 | 2017 |
Predicting the clinical impact of human mutation with deep neural networks L Sundaram, H Gao, SR Padigepati, JF McRae, Y Li, JA Kosmicki, ... Nature genetics 50 (8), 1161-1170, 2018 | 453 | 2018 |
Single shot text detector with regional attention P He, W Huang, T He, Q Zhu, Y Qiao, X Li Proceedings of the IEEE International Conference on Computer Vision, 3047-3055, 2017 | 396 | 2017 |
MySurgeryRisk: development and validation of a machine-learning risk algorithm for major complications and death after surgery A Bihorac, T Ozrazgat-Baslanti, A Ebadi, A Motaei, M Madkour, ... Annals of surgery 269 (4), 652-662, 2019 | 307 | 2019 |
S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme H Zhao, X Li 21st International Conference on Advanced Information Networking and …, 2007 | 294 | 2007 |
Guoguo: Enabling Fine-grained Indoor Localization via Smartphone K Liu, X Liu, X Li the 11th ACM MobiSys 2013, 2013 | 274 | 2013 |
Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN C Li, Y Wu, X Yuan, Z Sun, W Wang, X Li, L Gong International Journal of Communication Systems 31 (5), e3497, 2018 | 273 | 2018 |
Traffic-aware multiple mix zone placement for protecting location privacy X Liu, H Zhao, M Pan, H Yue, X Li, Y Fang 2012 Proceedings IEEE INFOCOM, 972-980, 2012 | 199 | 2012 |
GRAM-CNN: a deep learning approach with local context for named entity recognition in biomedical text Q Zhu, X Li, A Conesa, C Pereira Bioinformatics 34 (9), 1547-1554, 2018 | 176 | 2018 |
Rethinking the bottom-up framework for query-based video localization L Chen, C Lu, S Tang, J Xiao, D Zhang, C Tan, X Li Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 10551 …, 2020 | 173 | 2020 |
Distilled One-Shot Federated Learning Y Zhou, G Pu, X Ma, X Li, D Wu arXiv preprint arXiv:2009.07999, 2020 | 163 | 2020 |
A game-theoretic approach for achieving k-anonymity in location based services X Liu, K Liu, L Guo, X Li, Y Fang 2013 Proceedings IEEE INFOCOM, 2985-2993, 2013 | 162 | 2013 |
On the influence of start-up costs in scheduling divisible loads on bus networks B Veeravalli, X Li, CC Ko IEEE transactions on parallel and distributed systems 11 (12), 1288-1305, 2000 | 136 | 2000 |
Guoguo: Enabling fine-grained smartphone localization via acoustic anchors K Liu, X Liu, X Li IEEE transactions on mobile computing 15 (5), 1144-1156, 2015 | 116 | 2015 |
Identifying nontechnical power loss via spatial and temporal deep learning RR Bhat, RD Trevizan, R Sengupta, X Li, A Bretas 2016 15th IEEE International Conference on Machine Learning and Applications …, 2016 | 114 | 2016 |
SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks X Liu, H Zhao, X Yang, X Li IEEE Transactions on Computers 62 (1), 151-162, 2013 | 110 | 2013 |
Comparing clinical judgment with the MySurgeryRisk algorithm for preoperative risk assessment: a pilot usability study M Brennan, S Puri, T Ozrazgat-Baslanti, Z Feng, M Ruppert, ... Surgery 165 (5), 1035-1045, 2019 | 102 | 2019 |
My privacy my decision: Control of photo sharing on online social networks K Xu, Y Guo, L Guo, Y Fang, X Li IEEE Transactions on Dependable and Secure Computing 14 (2), 199-210, 2015 | 100 | 2015 |
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks H Zhao, X Li The Journal of Supercomputing 64 (3), 805-829, 2013 | 95 | 2013 |