Security of distributed intelligence in edge computing: Threats and countermeasures MS Ansari, SH Alsamhi, Y Qiao, Y Ye, B Lee The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and …, 2020 | 51 | 2020 |
Towards improved trust in threat intelligence sharing using blockchain and trusted computing Y Wu, Y Qiao, Y Ye, B Lee 2019 Sixth International Conference on Internet of Things: Systems …, 2019 | 34 | 2019 |
Ethereum transaction performance evaluation using test-nets L Zhang, B Lee, Y Ye, Y Qiao Euro-Par 2019: Parallel Processing Workshops: Euro-Par 2019 International …, 2020 | 29 | 2020 |
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks S Jacob, Y Qiao, Y Ye, B Lee Computers & Security 118, 102728, 2022 | 24 | 2022 |
Evaluation of ethereum end-to-end transaction latency L Zhang, B Lee, Y Ye, Y Qiao 2021 11th IFIP International Conference on New Technologies, Mobility and …, 2021 | 24 | 2021 |
Sok: context and risk aware access control for zero trust systems S Xiao, Y Ye, N Kanwal, T Newe, B Lee Security and Communication Networks 2022 (1), 7026779, 2022 | 18 | 2022 |
Delay-based network utility maximization modelling for congestion control in named data networking Y Ye, B Lee, R Flynn, J Xu, G Fang, Y Qiao IEEE/ACM Transactions On Networking 29 (5), 2184-2197, 2021 | 17 | 2021 |
PTP: Path-specified transport protocol for concurrent multipath transmission in named data networks Y Ye, B Lee, R Flynn, N Murray, G Fang, J Cao, Y Qiao Computer Networks 144, 280-296, 2018 | 16 | 2018 |
PIoT: Programmable IoT using information centric networking Y Ye, Y Qiao, B Lee, N Murray NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 825-829, 2016 | 15 | 2016 |
FRDA: Fingerprint Region based Data Augmentation using explainable AI for FTIR based microplastics classification X Yan, Z Cao, A Murphy, Y Ye, X Wang, Y Qiao Science of The Total Environment 896, 165340, 2023 | 9 | 2023 |
A novel framework for smart cyber defence: a deep-dive into deep learning attacks and defences I Arshad, SH Alsamhi, Y Qiao, B Lee, Y Ye IEEE Access 11, 88527-88548, 2023 | 9 | 2023 |
HLAF: heterogeneous-latency adaptive forwarding strategy for peer-assisted video streaming in NDN Y Ye, B Lee, R Flynn, N Murray, Y Qiao 2017 IEEE symposium on computers and communications (ISCC), 657-662, 2017 | 8 | 2017 |
Pixdoor: A pixel-space backdoor attack on deep learning models I Arshad, MN Asghar, Y Qiao, B Lee, Y Ye 2021 29th European Signal Processing Conference (EUSIPCO), 681-685, 2021 | 7 | 2021 |
Hop-by-hop congestion measurement and practical active queue management in NDN Y Ye, B Lee, Y Qiao GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 6 | 2020 |
B-icp: Backpressure interest control protocol for multipath communication in ndn Y Ye, B Lee, R Flynn, N Murray, Y Qiao GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 6 | 2017 |
IOTM: Iterative Optimization Trigger Method a Runtime Data-Free Backdoor Attacks on Deep Neural Networks I Arshad, SH Alsamhi, Y Qiao, B Lee, Y Ye IEEE Transactions on Artificial Intelligence, 2024 | 4 | 2024 |
Invisible encoded backdoor attack on DNNs using conditional GAN I Arshad, Y Qiao, B Lee, Y Ye 2023 IEEE International Conference on Consumer Electronics (ICCE), 01-05, 2023 | 4 | 2023 |
Transmission of 3D video content E Dumic, A Bjelopera, K Boussetta, LA da Silva Cruz, Y Qiao, ... 3D Visual Content Creation, Coding and Delivery, 195-221, 2019 | 2 | 2019 |
DeCoAgent: Large Language Model Empowered Decentralized Autonomous Collaboration Agents Based on Smart Contracts A Jin, Y Ye, B Lee, Y Qiao IEEE Access, 2024 | 1 | 2024 |
A comparative study of super-resolution algorithms for video streaming application X He, Y Qiao, B Lee, Y Ye Multimedia Tools and Applications 83 (14), 43493-43512, 2024 | 1 | 2024 |