An adaptive cloudlet placement method for mobile applications over GPS big data H Xiang, X Xu, H Zheng, S Li, T Wu, W Dou, S Yu 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 54 | 2016 |
A knowledge-driven anomaly detection framework for social production system Z Li, X Xu, T Hang, H Xiang, Y Cui, L Qi, X Zhou IEEE Transactions on Computational Social Systems, 2022 | 51 | 2022 |
Privacy-preserving distributed service recommendation based on locality-sensitive hashing L Qi, H Xiang, W Dou, C Yang, Y Qin, X Zhang 2017 IEEE International conference on web services (ICWS), 49-56, 2017 | 45 | 2017 |
An IoT-oriented offloading method with privacy preservation for cloudlet-enabled wireless metropolitan area networks Z Xu, R Gu, T Huang, H Xiang, X Zhang, L Qi, X Xu Sensors 18 (9), 3030, 2018 | 27 | 2018 |
Isolation forest based anomaly detection framework on non-IID data H Xiang, J Wang, K Ramamohanarao, Z Salcic, W Dou, X Zhang IEEE Intelligent Systems 36 (3), 31-40, 2021 | 18 | 2021 |
Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams H Xiang, X Zhang World Wide Web 25 (5), 2163-2183, 2022 | 15 | 2022 |
OPHiForest: order preserving hashing based isolation forest for robust and scalable anomaly detection H Xiang, Z Salcic, W Dou, X Xu, L Qi, X Zhang Proceedings of the 29th ACM international conference on information …, 2020 | 13 | 2020 |
Optiforest: Optimal isolation forest for anomaly detection H Xiang, X Zhang, H Hu, L Qi, W Dou, M Dras, A Beheshti, X Xu arXiv preprint arXiv:2306.12703, 2023 | 12 | 2023 |
Cmclrec: Cross-modal contrastive learning for user cold-start sequential recommendation X Xu, H Dong, L Qi, X Zhang, H Xiang, X Xia, Y Xu, W Dou Proceedings of the 47th International ACM SIGIR Conference on Research and …, 2024 | 11 | 2024 |
Clustering-based efficient privacy-preserving face recognition scheme without compromising accuracy M Liu, H Hu, H Xiang, C Yang, L Lyu, X Zhang ACM Transactions on Sensor Networks (TOSN) 17 (3), 1-27, 2021 | 11 | 2021 |
Deep optimal isolation forest with genetic algorithm for anomaly detection H Xiang, X Zhang, M Dras, A Beheshti, W Dou, X Xu 2023 IEEE International Conference on Data Mining (ICDM), 678-687, 2023 | 7 | 2023 |
Anomaly Detection Based on Isolation Mechanisms: A Survey Y Cao, H Xiang, H Zhang, Y Zhu, KM Ting arXiv preprint arXiv:2403.10802, 2024 | 4 | 2024 |
A cloud‐edge service offloading method for the metaverse in smart manufacturing H Xiang, X Zhang, M Bilal Software: Practice and Experience 54 (9), 1714-1732, 2024 | 3 | 2024 |
Deepiforest: A deep anomaly detection framework with hashing based isolation forest H Xiang, H Hu, X Zhang 2022 IEEE International Conference on Data Mining (ICDM), 1251-1256, 2022 | 3 | 2022 |
A Review on Air-Ground Coordination in Mobile Edge Computing: Key Technologies, Applications and Future Directions S Li, G Liu, L Li, Z Zhang, W Fei, H Xiang Tsinghua Science and Technology 30 (3), 1359-1386, 2024 | 1 | 2024 |
Federated Anomaly Detection with Isolation Forest for IoT Network Traffics J Li, X Zhang, H Xiang, A Beheshti 2023 IEEE 29th International Conference on Parallel and Distributed Systems …, 2023 | 1 | 2023 |
A Blockchain-enabled Secure Access Management Method in Edge Computing X Jiang, G Zhang, H Tian, H Xiang, X Zhang, W Dou 2023 IEEE 29th International Conference on Parallel and Distributed Systems …, 2023 | 1 | 2023 |
Camshift tracking method based on correlation probability graph for model pig X Zhang, W Gong, Q He, H Xiang, D Li, Y Wang, Y Chen, Y Liu EURASIP Journal on Wireless Communications and Networking 2020, 1-12, 2020 | 1 | 2020 |
Cloud-based AGV control system X Zhang, W Gong, H Xiang, Y Chen, D Li, Y Wang Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications …, 2020 | 1 | 2020 |
TAD-Bench: A Comprehensive Benchmark for Embedding-Based Text Anomaly Detection Y Cao, S Yang, C Li, H Xiang, L Qi, B Liu, R Li, M Liu arXiv preprint arXiv:2501.11960, 2025 | | 2025 |