Generative adversarial networks: A survey toward private and secure applications Z Cai, Z Xiong, H Xu, P Wang, W Li, Y Pan ACM Computing Surveys (CSUR) 54 (6), 1-38, 2021 | 352 | 2021 |
zkCrowd: a hybrid blockchain-based crowdsourcing platform S Zhu, Z Cai, H Hu, Y Li, W Li IEEE Transactions on Industrial Informatics 16 (6), 4196-4205, 2019 | 199 | 2019 |
Privacy Threat and Defense for Federated Learning with Non-i.i.d. Data in AIoT WL Zuobin Xiong, Zhipeng Cai, Daniel Takabi IEEE Transactions on Industrial Informatics, 2021 | 188 | 2021 |
Distributed auctions for task assignment and scheduling in mobile crowdsensing systems Z Duan, W Li, Z Cai 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 137 | 2017 |
AP Association for Proportional Fairness in Multi-Rate WLANs W Li, S Wang, Y Cui, X Cheng, R Xin, MA Al-Rodhaan, A Al-Dhelaan IEEE/ACM Transactions on Networking 22 (1), 191-202, 2014 | 116 | 2014 |
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds C Hu, W Li, X Cheng, J Yu, R Bie IEEE Transactions on Big Data, 0 | 111* | |
Exploiting multi-dimensional task diversity in distributed auctions for mobile crowdsensing Z Cai, Z Duan, W Li IEEE Transactions on Mobile Computing 20 (8), 2576-2591, 2020 | 107 | 2020 |
Privacy-preserving auto-driving: a GAN-based approach to protect vehicular camera data Z Xiong, W Li, Q Han, Z Cai 2019 IEEE International Conference on Data Mining (ICDM), 668-677, 2019 | 99 | 2019 |
Adversarial privacy-preserving graph embedding against inference attack K Li, G Luo, Y Ye, W Li, S Ji, Z Cai IEEE Internet of Things Journal 8 (8), 6904-6915, 2020 | 89 | 2020 |
ADGAN: Protect your location privacy in camera data of auto-driving vehicles Z Xiong, Z Cai, Q Han, A Alrawais, W Li IEEE Transactions on Industrial Informatics 17 (9), 6200-6210, 2020 | 81 | 2020 |
Multi-source adversarial sample attack on autonomous vehicles Z Xiong, H Xu, W Li, Z Cai IEEE Transactions on Vehicular Technology 70 (3), 2822-2835, 2021 | 80 | 2021 |
Coin hopping attack in blockchain-based IoT S Zhu, W Li, H Li, L Tian, G Luo, Z Cai IEEE Internet of Things Journal 6 (3), 4614-4626, 2018 | 78 | 2018 |
Cooperative Multi-hop Relaying via Network Formation Games in Cognitive Radio Networks W Li, X Cheng, T Jing, X Xing IEEE INFOCOM, 995-1003, 2013 | 72 | 2013 |
Partially Overlapping Channel Assignment Based on Node Orthogonality for 802.11 Wireless Networks Y Cui, W Li, X Cheng IEEE INFOCOM Mini-Conference, 361-365, 2011 | 63 | 2011 |
Pseudo label-driven federated learning-based decentralized indoor localization via mobile crowdsourcing W Li, C Zhang, Y Tanaka IEEE Sensors Journal 20 (19), 11556-11565, 2020 | 58 | 2020 |
Mutual-preference driven truthful auction mechanism in mobile crowdsensing Z Duan, W Li, X Zheng, Z Cai 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 52 | 2019 |
Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs W Li, Y Cui, X Cheng, MA Al-Rodhaan, A Al-Dhelaan IEEE Transactions on Wireless Communications (TWC) 10 (11), 3784-3792, 2011 | 44 | 2011 |
Optimal contract-based mechanisms for online data trading markets L Tian, J Li, W Li, B Ramesh, Z Cai IEEE Internet of Things Journal 6 (5), 7800-7810, 2019 | 41 | 2019 |
Hybrid blockchain design for privacy preserving crowdsourcing platform S Zhu, H Hu, Y Li, W Li 2019 IEEE International Conference on Blockchain (Blockchain), 26-33, 2019 | 40 | 2019 |
AIBench: towards scalable and comprehensive datacenter AI benchmarking W Gao, C Luo, L Wang, X Xiong, J Chen, T Hao, Z Jiang, F Fan, M Du, ... Benchmarking, Measuring, and Optimizing: First BenchCouncil International …, 2019 | 36 | 2019 |