


default search action
Qiying Cao
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Shigen Shen
, Xuanbin Hao, Zhengjun Gao, Guowen Wu
, Yizhou Shen
, Hong Zhang
, Qiying Cao
, Shui Yu
:
SAC-PP: Jointly Optimizing Privacy Protection and Computation Offloading for Mobile Edge Computing. IEEE Trans. Netw. Serv. Manag. 21(6): 6190-6203 (2024) - 2022
- [c11]Zhengjun Gao, Guowen Wu
, Yizhou Shen, Hong Zhang, Shigen Shen
, Qiying Cao
:
DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation Offloading. INFOCOM Workshops 2022: 1-6 - 2021
- [j24]Xiaojun Wu
, Qiying Cao
, Juan Jin, Yuanjie Li
, Hong Zhang
:
Corrigendum to "Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection". Wirel. Commun. Mob. Comput. 2021: 3847016:1-3847016:9 (2021) - 2020
- [j23]Shigen Shen
, Haiping Zhou, Sheng Feng, Jianhua Liu
, Hong Zhang, Qiying Cao
:
An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs. IEEE Access 8: 43876-43887 (2020) - [j22]Hong Zhang
, Shigen Shen
, Qiying Cao
, Xiaojun Wu
, Shaofeng Liu:
Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton. Int. J. Distributed Sens. Networks 16(11): 155014772097294 (2020)
2010 – 2019
- 2019
- [j21]Shigen Shen
, Haiping Zhou, Sheng Feng, Jianhua Liu
, Qiying Cao
:
SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks. IEEE Access 7: 92881-92892 (2019) - [j20]Shigen Shen
, Haiping Zhou, Sheng Feng, Longjun Huang, Jianhua Liu
, Shui Yu
, Qiying Cao
:
HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs. J. Netw. Comput. Appl. 146 (2019) - [j19]Xiaojun Wu
, Qiying Cao
, Juan Jin, Yuanjie Li, Hong Zhang:
Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection. Wirel. Commun. Mob. Comput. 2019: 4392839:1-4392839:9 (2019) - 2018
- [j18]Xiaojun Wu
, Qiying Cao
, Yuanjie Li:
A research on wireless sensor networks' node positioning mechanism based on Narrowband Internet of Things data linking. Int. J. Distributed Sens. Networks 14(12) (2018) - [j17]Shigen Shen
, Longjun Huang
, Haiping Zhou
, Shui Yu
, En Fan, Qiying Cao
:
Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks. IEEE Internet Things J. 5(2): 1043-1054 (2018) - [c10]Xiaojun Wu, Qiying Cao, Juan Jin, Hong Zhang:
Nodes Availability Analysis of Heterogeneous Wireless Sensor Networks Based on NB-IoT Under Malware Infection. ICSAI 2018: 429-434 - 2017
- [j16]Shigen Shen
, Haiping Ma, En Fan
, Keli Hu
, Shui Yu
, Jianhua Liu
, Qiying Cao
:
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion. J. Netw. Comput. Appl. 91: 26-35 (2017) - 2016
- [j15]Hongyun Xu, Ding Wang, Shigen Shen
, Youqun Shi, Qiying Cao
:
An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(5): 2873439:1-2873439:13 (2016) - [j14]Shigen Shen
, Longjun Huang
, En Fan
, Keli Hu
, Jianhua Liu
, Qiying Cao
:
Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach. J. Sensors 2016: 4254701:1-4254701:10 (2016) - [j13]Shigen Shen
, Longjun Huang, Jianhua Liu
, Adam C. Champion, Shui Yu
, Qiying Cao
:
Reliability Evaluation for Clustered WSNs under Malware Propagation. Sensors 16(6): 855 (2016) - 2015
- [j12]Shigen Shen
, Keli Hu
, Longjun Huang, Hongjie Li, Risheng Han, Qiying Cao
:
Optimal Report Strategies for WBANs Using a Cloud-Assisted IDS. Int. J. Distributed Sens. Networks 11: 184239:1-184239:14 (2015) - [j11]Yuanjie Li, Hongyun Xu, Qiying Cao
, Zichuan Li, Shigen Shen
:
Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 818903:1-818903:12 (2015) - [j10]Shigen Shen
, Keli Hu
, Longjun Huang
, Hongjie Li, Risheng Han
, Qiying Cao
:
Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs. Mob. Inf. Syst. 2015: 179839:1-179839:10 (2015) - 2014
- [j9]Weixun Gao, Qiying Cao
, Yao Qian:
Cross-Dialectal Voice Conversion with Neural Networks. IEICE Trans. Inf. Syst. 97-D(11): 2872-2880 (2014) - [j8]Weixun Gao, Qiying Cao:
Frequency Warping for Speaker Adaptation in HMM-based Speech Synthesis. J. Inf. Sci. Eng. 30(4): 1149-1166 (2014) - [j7]Shigen Shen
, Hongjie Li, Risheng Han, Athanasios V. Vasilakos
, Yihan Wang, Qiying Cao
:
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 9(11): 1962-1973 (2014) - 2013
- [c9]Hongyun Xu
, Bastin Tony Roy Savarimuthu, Aditya Ghose, Evan D. Morrison, Qiying Cao
, Youqun Shi:
Automatic BDI Plan Recognition from Process Execution Logs and Effect Logs. EMAS@AAMAS 2013: 274-291 - [c8]Hongyun Xu
, Youqun Shi, Qiying Cao
:
BDI Goal Recognition for Agent Program Learning. INCoS 2013: 380-387 - 2012
- [j6]Shigen Shen
, Risheng Han, Lizheng Guo
, Wei Li, Qiying Cao
:
Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain. Appl. Soft Comput. 12(5): 1467-1476 (2012) - 2011
- [j5]Shigen Shen
, Yuanjie Li, Hongyun Xu
, Qiying Cao
:
Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 62(6): 2404-2416 (2011) - [j4]Shigen Shen
, Guangxue Yue, Qiying Cao
, Fei Yu:
A Survey of Game Theory in Wireless Sensor Networks Security. J. Networks 6(3): 521-532 (2011) - 2010
- [j3]Jiliang Zhou, Qiying Cao
, Caixia Li, Runcai Huang:
A genetic algorithm based on extended sequence and topology encoding for the multicast protocol in two-tiered WSN. Expert Syst. Appl. 37(2): 1684-1695 (2010) - [c7]Fang Pu, Linlang Liu, Yu Shen, Qiying Cao
:
P2P-Based Semantic Policy Infrastucture for Pervasive Computing. CIS 2010: 541-545
2000 – 2009
- 2009
- [j2]Haibin Cai, Xiaohui Hu, Qingchong Lü, Qiying Cao
:
A novel intelligent service selection algorithm and application for ubiquitous web services environment. Expert Syst. Appl. 36(2): 2200-2212 (2009) - 2008
- [j1]Haibin Cai, Fang Pu, Runcai Huang, Qiying Cao
:
A novel ANN-based service selection model for ubiquitous computing environments. J. Netw. Comput. Appl. 31(4): 944-965 (2008) - [c6]Qingcong Lv, Fan Yang, Qiying Cao
, Shaozi Li:
A tuplespace-based coordination architecture for service composition in pervasive computing environments. CSCWD 2008: 399-403 - [c5]Runcai Huang, Qiying Cao
, Jiliang Zhou, Daoqing Sun, Qianmin Su:
Context-Aware Active Task Discovery for Pervasive Computing. CSSE (1) 2008: 463-466 - [c4]Runcai Huang, Yiwen Zhuang, Qiying Cao
:
Simulation and Analysis of MFlood Protocol in Wireless Network. ISCSCT (1) 2008: 658-662 - 2006
- [c3]Haibin Cai, Daoqing Sun, Qiying Cao
, Fang Pu:
A Novel BP Algorithm Based on Three-term and Application in Service Selection of Ubiquitous Computing. ICARCV 2006: 1-6 - [c2]Haibin Cai, Liangxu Liu, Qiying Cao:
A Novel BP Algorithm Based on Self-adaptive Parameters and Performance Analysis. ICICIC (2) 2006: 383-387 - [c1]Fang Pu, Daoqing Sun, Qiying Cao
, Haibin Cai, Fan Yang:
Pervasive Computing Context Access Control Based on UCON_ABC Model. IIH-MSP 2006: 689-692
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint