Applying big data based deep learning system to intrusion detection W Zhong, N Yu, C Ai Big Data Mining and Analytics 3 (3), 181-195, 2020 | 145 | 2020 |
Transforming complete coverage algorithms to partial coverage algorithms for wireless sensor networks Y Li, C Vu, C Ai, G Chen, Y Zhao IEEE Transactions on Parallel and Distributed Systems 22 (4), 695-703, 2010 | 90 | 2010 |
On the construction of k-connected m-dominating sets in wireless networks Y Li, Y Wu, C Ai, R Beyah Journal of combinatorial optimization 23, 118-139, 2012 | 84 | 2012 |
Sensor scheduling for p-percent coverage in wireless sensor networks Y Li, C Ai, Z Cai, R Beyah Cluster Computing 14, 27-40, 2011 | 66 | 2011 |
Delay-bounded and energy-efficient composite event monitoring in heterogeneous wireless sensor networks Y Li, C Ai, C Vu, Y Pan, R Beyah IEEE Transactions on Parallel and Distributed Systems 21 (9), 1373-1385, 2009 | 43 | 2009 |
Privacy protection on sliding window of data streams W Wang, J Li, C Ai, Y Li 2007 International Conference on Collaborative Computing: Networking …, 2007 | 43 | 2007 |
Processing area queries in wireless sensor networks C Ai, L Guo, Z Cai, Y Li 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 1-8, 2009 | 42 | 2009 |
Data estimation in sensor networks using physical and statistical methodologies Y Li, C Ai, WP Deshmukh, Y Wu 2008 The 28th International Conference on Distributed Computing Systems, 538-545, 2008 | 42 | 2008 |
Real time clustering of sensory data in wireless sensor networks L Guo, C Ai, X Wang, Z Cai, Y Li 2009 IEEE 28th International Performance Computing and Communications …, 2009 | 36 | 2009 |
An urban area-oriented traffic information query strategy in VANETs X Wang, L Guo, C Ai, J Li, Z Cai Wireless Algorithms, Systems, and Applications: 8th International Conference …, 2013 | 30 | 2013 |
Time constraint influence maximization algorithm in the age of big data M Han, Z Duan, C Ai, FW Lybarger, Y Li, AG Bourgeois International Journal of Computational Science and Engineering 15 (3-4), 165-175, 2017 | 21 | 2017 |
Differentially private k-anonymity: Achieving query privacy in location-based services J Wang, Z Cai, C Ai, D Yang, H Gao, X Cheng 2016 International Conference on Identification, Information and Knowledge …, 2016 | 19 | 2016 |
An efficient social event invitation framework based on historical data of smart devices C Ai, M Han, J Wang, M Yan 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud …, 2016 | 19 | 2016 |
p-Percent Coverage in Wireless Sensor Networks Y Wu, C Ai, S Gao, Y Li Wireless Algorithms, Systems, and Applications: Third International …, 2008 | 19 | 2008 |
Data aggregation scheduling in probabilistic wireless networks with cognitive radio capability M Yan, M Han, C Ai, Z Cai, Y Li 2016 IEEE global communications conference (GLOBECOM), 1-6, 2016 | 17 | 2016 |
Near-complete privacy protection: Cognitive optimal strategy in location-based services M Han, J Wang, M Yan, C Ai, Z Duan, Z Hong Procedia Computer Science 129, 298-304, 2018 | 15 | 2018 |
Dsf-a distributed security framework for heterogeneous wireless sensor networks H Saxena, C Ai, M Valero, Y Li, R Beyah 2010-MILCOM 2010 Military Communications Conference, 1836-1843, 2010 | 12 | 2010 |
A novel clustering topology control for reliable multi-hop routing in wireless sensor networks R Du, C Ai, L Guo, J Chen, J Liu, J He, Y Li J. Commun. 5 (9), 654-664, 2010 | 12 | 2010 |
Authentic delay bounded event detection in heterogeneous wireless sensor networks C Ai, H Hou, Y Li, R Beyah Ad Hoc Networks 7 (3), 599-613, 2009 | 12 | 2009 |
In-network historical data storage and query processing based on distributed indexing techniques in wireless sensor networks C Ai, R Du, M Zhang, Y Li Wireless Algorithms, Systems, and Applications: 4th International Conference …, 2009 | 11 | 2009 |