Context-aware biaffine localizing network for temporal sentence grounding D Liu, X Qu, J Dong, P Zhou, Y Cheng, W Wei, Z Xu, Y Xie Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 170 | 2021 |
Real-time prediction of docker container resource load based on a hybrid model of ARIMA and triple exponential smoothing Y Xie, M Jin, Z Zou, G Xu, D Feng, W Liu, D Long IEEE Transactions on Cloud Computing 10 (2), 1386-1401, 2020 | 84 | 2020 |
A resource-constrained and privacy-preserving edge-computing-enabled clinical decision system: A federated reinforcement learning approach Z Xue, P Zhou, Z Xu, X Wang, Y Xie, X Ding, S Wen IEEE Internet of Things Journal 8 (11), 9122-9138, 2021 | 82 | 2021 |
A docker container anomaly monitoring system based on optimized isolation forest Z Zou, Y Xie, K Huang, G Xu, D Feng, D Long IEEE Transactions on Cloud Computing 10 (1), 134-145, 2019 | 77 | 2019 |
Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments Y Xie, D Feng, Y Hu, Y Li, S Sample, D Long IEEE Transactions on Dependable and Secure Computing 17 (6), 1283-1296, 2018 | 67 | 2018 |
A hybrid approach for efficient provenance storage Y Xie, D Feng, Z Tan, L Chen, KK Muniswamy-Reddy, Y Li, DDE Long Proceedings of the 21st ACM international conference on Information and …, 2012 | 58 | 2012 |
Evaluation of a hybrid approach for efficient provenance storage Y Xie, KK Muniswamy-Reddy, D Feng, Y Li, DDE Long ACM Transactions on Storage (TOS) 9 (4), 1-29, 2013 | 57 | 2013 |
Unifying intrusion detection and forensic analysis via provenance awareness Y Xie, D Feng, Z Tan, J Zhou Future Generation Computer Systems 61, 26-36, 2016 | 53 | 2016 |
Design and evaluation of oasis: An active storage framework based on t10 osd standard Y Xie, KK Muniswamy-Reddy, D Feng, DDE Long, Y Kang, Z Niu, Z Tan 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST), 1-12, 2011 | 52 | 2011 |
Compressing provenance graphs Y Xie, KK Muniswamy-Reddy, DDE Long, A Amer, D Feng, Z Tan 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP 11), 2011 | 48 | 2011 |
P-gaussian: provenance-based gaussian distribution for detecting intrusion behavior variants using high efficient and real time memory databases Y Xie, Y Wu, D Feng, D Long IEEE Transactions on Dependable and Secure Computing 18 (6), 2658-2674, 2019 | 30 | 2019 |
QoE-aware 3D video streaming via deep reinforcement learning in software defined networking enabled mobile edge computing P Zhou, Y Xie, B Niu, L Pu, Z Xu, H Jiang, H Huang IEEE Transactions on Network Science and Engineering 8 (1), 419-433, 2020 | 26 | 2020 |
Paradise: real-time, generalized, and distributed provenance-based intrusion detection Y Wu, Y Xie, X Liao, P Zhou, D Feng, L Wu, X Li, A Wildani, D Long IEEE Transactions on Dependable and Secure Computing 20 (2), 1624-1640, 2022 | 24 | 2022 |
Oasis: An active storage framework for object storage platform Y Xie, D Feng, Y Li, DDE Long Future Generation Computer Systems 56, 746-758, 2016 | 19 | 2016 |
Efficient provenance management via clustering and hybrid storage in big data environments D Hu, D Feng, Y Xie, G Xu, X Gu, D Long IEEE Transactions on Big Data 6 (4), 792-803, 2019 | 18 | 2019 |
Trustworthy and context-aware distributed online learning with autoscaling for content caching in collaborative mobile edge computing P Zhou, S Gong, Z Xu, L Chen, Y Xie, C Jiang, X Ding IEEE Transactions on Cognitive Communications and Networking 7 (4), 1032-1047, 2021 | 17 | 2021 |
EGC: A novel event-oriented graph clustering framework for social media text D Hu, D Feng, Y Xie Information Processing & Management 59 (6), 103059, 2022 | 16 | 2022 |
3DHacker: Spectrum-based decision boundary generation for hard-label 3D point cloud attack Y Tao, D Liu, P Zhou, Y Xie, W Du, W Hu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 15 | 2023 |
A novel hybrid model for docker container workload prediction L Zhang, Y Xie, M Jin, P Zhou, G Xu, Y Wu, D Feng, D Long IEEE Transactions on Network and Service Management 20 (3), 2726-2743, 2023 | 12 | 2023 |
Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead Y Xie, D Feng, X Liao, L Qin Digital Investigation 26, 19-28, 2018 | 10 | 2018 |