Cloud computing: IT as a service G Lin, D Fu, J Zhu, G Dasmalchi IT professional 11 (2), 10-13, 2009 | 404* | 2009 |
Sentiment analysis using deep learning approaches: an overview O Habimana, Y Li, R Li, X Gu, G Yu Science China Information Sciences 63, 1-36, 2020 | 224 | 2020 |
Multiagent deep reinforcement learning for joint multichannel access and task offloading of mobile-edge computing in industry 4.0 Z Cao, P Zhou, R Li, S Huang, D Wu IEEE Internet of Things Journal 7 (7), 6201-6213, 2020 | 171 | 2020 |
Efficient multi-keyword ranked query over encrypted data in cloud computing R Li, Z Xu, W Kang, KC Yow, CZ Xu Future Generation Computer Systems 30, 179-190, 2014 | 160 | 2014 |
Secure sensitive data sharing on a big data platform X Dong, R Li, H He, W Zhou, Z Xue, H Wu Tsinghua science and technology 20 (1), 72-80, 2015 | 135 | 2015 |
A lightweight secure data sharing scheme for mobile cloud computing R Li, C Shen, H He, X Gu, Z Xu, CZ Xu IEEE Transactions on Cloud Computing 6 (2), 344-357, 2017 | 112 | 2017 |
Incremental K-clique clustering in dynamic social networks D Duan, Y Li, R Li, Z Lu Artificial Intelligence Review 38, 129-147, 2012 | 101 | 2012 |
A MapReduce task scheduling algorithm for deadline constraints Z Tang, J Zhou, K Li, R Li Cluster computing 16, 651-662, 2013 | 90 | 2013 |
Blockchain based data integrity verification in P2P cloud storage D Yue, R Li, Y Zhang, W Tian, C Peng 2018 IEEE 24th international conference on parallel and distributed systems …, 2018 | 89 | 2018 |
Efficient multi-keyword ranked query on encrypted data in the cloud Z Xu, W Kang, R Li, KC Yow, CZ Xu 2012 IEEE 18th international conference on parallel and distributed systems …, 2012 | 81 | 2012 |
Secure, efficient and fine-grained data access control mechanism for P2P storage cloud H He, R Li, X Dong, Z Zhang IEEE transactions on cloud computing 2 (4), 471-484, 2014 | 79 | 2014 |
Dynamic role and context-based access control for grid applications H Yao, H Hu, B Huang, R Li Sixth International Conference on Parallel and Distributed Computing …, 2005 | 67* | 2005 |
Blockchain-based verification framework for data integrity in edge-cloud storage D Yue, R Li, Y Zhang, W Tian, Y Huang Journal of Parallel and Distributed Computing 146, 1-14, 2020 | 63 | 2020 |
Margin-based few-shot class-incremental learning with class-level overfitting mitigation Y Zou, S Zhang, Y Li, R Li Advances in neural information processing systems 35, 27267-27279, 2022 | 59 | 2022 |
EADP: An extended adaptive density peaks clustering for overlapping community detection in social networks M Xu, Y Li, R Li, F Zou, X Gu Neurocomputing 337, 287-302, 2019 | 59 | 2019 |
Role mining based on weights X Ma, R Li, Z Lu Proceedings of the 15th ACM symposium on Access control models and …, 2010 | 59 | 2010 |
Android malware obfuscation variants detection method based on multi-granularity opcode features J Tang, R Li, Y Jiang, X Gu, Y Li Future Generation Computer Systems 129, 141-151, 2022 | 56 | 2022 |
Dafkd: Domain-aware federated knowledge distillation H Wang, Y Li, W Xu, R Li, Y Zhan, Z Zeng Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2023 | 54 | 2023 |
A novel hybrid method to analyze security vulnerabilities in android applications J Tang, R Li, K Wang, X Gu, Z Xu Tsinghua Science and Technology 25 (5), 589-603, 2020 | 47 | 2020 |
A comprehensive survey on training acceleration for large machine learning models in IoT H Wang, Z Qu, Q Zhou, H Zhang, B Luo, W Xu, S Guo, R Li IEEE Internet of Things Journal 9 (2), 939-963, 2021 | 45 | 2021 |