• Publications
  • Influence
Modeling Propagation Dynamics of Social Network Worms
TLDR
Social network worms, such as email worms and facebook worms, pose a critical security threat to the Internet. Expand
  • 98
  • 7
  • PDF
Migration Modeling and Learning Algorithms for Containers in Fog Computing
TLDR
We propose novel container migration algorithms and architecture to support distributed domain-specific applications with cloud-like quality of service. Expand
  • 58
  • 4
Edge-based differential privacy computing for sensor-cloud systems
TLDR
We propose an edge-based model for data collection, in which the raw data from wireless sensor networks (WSNs) is differentially processed by algorithms on edge servers for privacy computing. Expand
  • 31
  • 3
  • PDF
Pattern Mutation in Wireless Sensor Deployment
TLDR
In this paper, we study the optimal deployment pattern problem in wireless sensor networks (WSNs). Expand
  • 29
  • 2
Decision analysis of network-based intrusion detection systems for denial-of-service attacks
TLDR
This paper gives the representations to describe three probability distributions. Expand
  • 24
  • 2
Sustainable and Efficient Data Collection from WSNs to Cloud
TLDR
We propose a new problem which focuses on collecting data from WSNs to cloud within a limited time and this problem is proved to be NP-hard. Expand
  • 47
  • 1
  • PDF
MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things
TLDR
We evaluate the trustworthiness of sensor nodes using probabilistic graphical model. Expand
  • 39
  • 1
Scheduling Hard and Soft Real-Time Communication in the Controller Area Network (CAN)
TLDR
This paper introduces a mechanism to implement distributed scheduling for CAN-bus resource in order to meet the requirements of a dynamic distributed real-time system. Expand
  • 57
  • 1
Interactive Variance Attention based Online Spoiler Detection for Time-Sync Comments
TLDR
We propose a novel Similarity-Based Network with Interactive Variance Attention (SBN-IVA) to classify comments as spoilers or not. Expand
  • 1
  • 1
  • PDF
Correlation form of timestamp increment sequences of self-similar traffic on Ethernet
TLDR
An empirical correlation form for modelling the autocorrelation functions of the timestamp increment sequences of self-similar traffic is presented. Expand
  • 27
  • PDF