Adversarial examples: Attacks and defenses for deep learning X Yuan, P He, Q Zhu, X Li IEEE transactions on neural networks and learning systems 30 (9), 2805-2824, 2019 | 1967 | 2019 |
DeepDefense: identifying DDoS attack via deep learning X Yuan, C Li, X Li 2017 IEEE International Conference on Smart Computing (SMARTCOMP), 1-8, 2017 | 433 | 2017 |
Single shot text detector with regional attention P He, W Huang, T He, Q Zhu, Y Qiao, X Li Proceedings of the IEEE International Conference on Computer Vision, 3047-3055, 2017 | 373 | 2017 |
Predicting the clinical impact of human mutation with deep neural networks L Sundaram, H Gao, SR Padigepati, JF McRae, Y Li, JA Kosmicki, ... Nature genetics 50 (8), 1161-1170, 2018 | 368 | 2018 |
S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme H Zhao, X Li 21st International Conference on Advanced Information Networking and …, 2007 | 288 | 2007 |
Guoguo: Enabling Fine-grained Indoor Localization via Smartphone K Liu, X Liu, X Li the 11th ACM MobiSys 2013, 2013 | 266 | 2013 |
MySurgeryRisk: development and validation of a machine-learning risk algorithm for major complications and death after surgery A Bihorac, T Ozrazgat-Baslanti, A Ebadi, A Motaei, M Madkour, ... Annals of surgery 269 (4), 652-662, 2019 | 262 | 2019 |
Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN C Li, Y Wu, X Yuan, Z Sun, W Wang, X Li, L Gong International Journal of Communication Systems 31 (5), e3497, 2018 | 242 | 2018 |
Traffic-aware multiple mix zone placement for protecting location privacy X Liu, H Zhao, M Pan, H Yue, X Li, Y Fang 2012 Proceedings IEEE INFOCOM, 972-980, 2012 | 187 | 2012 |
GRAM-CNN: a deep learning approach with local context for named entity recognition in biomedical text Q Zhu, X Li, A Conesa, C Pereira Bioinformatics 34 (9), 1547-1554, 2018 | 163 | 2018 |
A game-theoretic approach for achieving k-anonymity in location based services X Liu, K Liu, L Guo, X Li, Y Fang 2013 Proceedings IEEE INFOCOM, 2985-2993, 2013 | 158 | 2013 |
Rethinking the bottom-up framework for query-based video localization L Chen, C Lu, S Tang, J Xiao, D Zhang, C Tan, X Li Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 10551 …, 2020 | 148 | 2020 |
On the influence of start-up costs in scheduling divisible loads on bus networks B Veeravalli, X Li, CC Ko IEEE transactions on parallel and distributed systems 11 (12), 1288-1305, 2000 | 136 | 2000 |
Distilled One-Shot Federated Learning Y Zhou, G Pu, X Ma, X Li, D Wu arXiv preprint arXiv:2009.07999, 2020 | 117 | 2020 |
Identifying nontechnical power loss via spatial and temporal deep learning RR Bhat, RD Trevizan, R Sengupta, X Li, A Bretas 2016 15th IEEE International Conference on Machine Learning and Applications …, 2016 | 110 | 2016 |
SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks X Liu, H Zhao, X Yang, X Li IEEE Transactions on Computers 62 (1), 151-162, 2013 | 110 | 2013 |
Guoguo: Enabling fine-grained smartphone localization via acoustic anchors K Liu, X Liu, X Li IEEE transactions on mobile computing 15 (5), 1144-1156, 2015 | 108 | 2015 |
My privacy my decision: Control of photo sharing on online social networks K Xu, Y Guo, L Guo, Y Fang, X Li IEEE Transactions on Dependable and Secure Computing 14 (2), 199-210, 2015 | 95 | 2015 |
Distributed image processing on a network of workstations XL Li, B Veeravalli, CC Ko International Journal of Computers and Applications 25 (2), 136-145, 2003 | 91 | 2003 |
Optimal resource rental planning for elastic applications in cloud market H Zhao, M Pan, X Liu, X Li, Y Fang 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 90 | 2012 |