Magic: A distributed max-gain in-network caching strategy in information-centric networks J Ren, W Qi, C Westphal, J Wang, K Lu, S Liu, S Wang 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2014 | 123 | 2014 |
OpenSCaaS: an open service chain as a service platform toward the integration of SDN and NFV W Ding, W Qi, J Wang, B Chen Network, IEEE 29 (3), 30-35, 2015 | 95 | 2015 |
Whispers in the cloud storage: A novel cross-user deduplication-based covert channel design H Hovhannisyan, W Qi, K Lu, R Yang, J Wang Peer-to-Peer Networking and Applications 11 (2), 277-286, 2018 | 24 | 2018 |
Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones W Qi, W Ding, X Wang, Y Jiang, Y Xu, J Wang, K Lu IEEE Transactions on Mobile Computing 1 (99), 1-14, 2017 | 23 | 2017 |
A novel deduplication-based covert channel in cloud storage service H Hovhannisyan, K Lu, R Yang, W Qi, J Wang, M Wen 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 13 | 2015 |
Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones Wen Qi, Yichen Xu, Wanfu Ding, Yonghang Jiang, Jianping Wang, Kejie Lu 2015 IEEE 23rd International Conference on Network Protocols (ICNP), 201 - 211, 2015 | 12 | 2015 |
A Generic Mitigation Framework against Cross-VM Covert Channels W Qi, J Wang, H Hovhannisyan, K Lu, J Wang, J Zhu 25th International Conference on Computer Communications and Networks (ICCCN …, 2016 | 9 | 2016 |
A Provident Resource Defragmentation Framework for Mobile Cloud Computing W Hou, R Zhang, W Qi, K Lu, J Wang, L Guo IEEE Transactions on Emerging Topics in Computing, 2015 | 8 | 2015 |
Providing Service Continuity in Clouds under Power Outage W Wu, J Wang, K Lu, W Qi, F Shan, J Luo IEEE Transactions on Services Computing, 2017 | 5 | 2017 |
Cross-vm covert channel risk assessment for cloud computing: An automated capacity profiler R Zhang, W Qi, J Wang 2014 IEEE 22nd International Conference on Network Protocols, 25-36, 2014 | 3 | 2014 |
Provisioning of virtual machines with security requirements J Wang, W Qi US Patent App. 15/111,231, 2017 | 1 | 2017 |
Automatic profiling framework of cross-vm covert channel capacity J Wang, R Zhang, W Qi CN Patent WO 2016061742 A1, 2016 | 1 | 2016 |
调度人工智能平台资源的方法、设备和计算机可读存储介质 CN Patent App. CN202110313956.7, 2021 | | 2021 |
异构资源调度方法、装置、设备和计算机可读存储介质 CN Patent App. CN202110313443.6, 2021 | | 2021 |
一种可视化建模方法、装置、设备和计算机可读存储介质 CN Patent App. CN202110313953.3, 2021 | | 2021 |
一种三通道荧光定位超分辨率生物显微系统及方法 CN Patent App. CN201810004948.2, 2018 | | 2018 |
Mitigation of Cross‐VM Covert Channel J Wang, W QI, J Wang, H DUAN CN Patent WO2017214856A1, 2017 | | 2017 |
Mitigation of Sensor-based Covert Channels in Mobile Devices J WANG, W QI, X WANG CN Patent WO2017197554A1, 2017 | | 2017 |