Keqiu Li
TitleCited byYear
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Y Yu, K Li, W Zhou, P Li
Journal of Network and computer Applications 35 (3), 867-880, 2012
Big data processing in cloud computing environments
C Ji, Y Li, W Qiu, U Awada, K Li
2012 12th international symposium on pervasive systems, algorithms and …, 2012
Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks
H Li, K Lin, K Li
Computer Communications 34 (4), 591-597, 2011
Optimized big data K-means clustering using MapReduce
X Cui, P Zhu, X Yang, K Li, C Ji
The Journal of Supercomputing 70 (3), 1249-1259, 2014
Heterogeneous ad hoc networks: Architectures, advances and challenges
T Qiu, N Chen, K Li, D Qiao, Z Fu
Ad Hoc Networks 55, 143-152, 2017
An effective solution for trademark image retrieval by combining shape description and feature matching
H Qi, K Li, Y Shen, W Qu
Pattern Recognition 43 (6), 2017-2027, 2010
How can heterogeneous Internet of Things build our future: A survey
T Qiu, N Chen, K Li, M Atiquzzaman, W Zhao
IEEE Communications Surveys & Tutorials 20 (3), 2011-2027, 2018
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Y Liu, K Li, Y Jin, Y Zhang, W Qu
Future Generation Computer Systems 27 (5), 547-554, 2011
RRAM-based analog approximate computing
B Li, P Gu, Y Shan, Y Wang, Y Chen, H Yang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks
H Li, X Xing, J Zhu, X Cheng, K Li, R Bie, T Jing
IEEE Transactions on Vehicular Technology 66 (1), 645-655, 2016
Completely pinpointing the missing RFID tags in a time-efficient way
X Liu, K Li, G Min, Y Shen, AX Liu, W Qu
IEEE Transactions on Computers 64 (1), 87-96, 2013
Optimal methods for coordinated enroute web caching for tree networks
K Li, H Shen, FYL Chin, SQ Zheng
ACM Transactions on Internet Technology (TOIT) 5 (3), 480-507, 2005
Performance guaranteed computation offloading for mobile-edge cloud computing
X Tao, K Ota, M Dong, H Qi, K Li
IEEE Wireless Communications Letters 6 (6), 774-777, 2017
Reliable and energy-efficient multipath communications in underwater sensor networks
J Xu, K Li, G Min
IEEE Transactions on Parallel and Distributed Systems 23 (7), 1326-1335, 2011
Spark2: Top-k keyword query in relational databases
Y Luo, W Wang, X Lin, X Zhou, J Wang, K Li
IEEE Transactions on Knowledge and Data Engineering 23 (12), 1763-1780, 2011
Fault classifier of rotating machinery based on weighted support vector data description
Y Zhang, XD Liu, FD Xie, KQ Li
Expert Systems with Applications 36 (4), 7928-7932, 2009
Efficient unknown tag identification protocols in large-scale RFID systems
X Liu, K Li, G Min, K Lin, B Xiao, Y Shen, W Qu
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3145-3155, 2014
Energy consumption in cloud computing data centers
A Uchechukwu, K Li, Y Shen
International Journal of Cloud Computing and Services Science (IJ-CLOSER) 3 …, 2014
Multimedia object placement for transparent data replication
K Li, H Shen, FYL Chin, W Zhang
IEEE Transactions on Parallel and Distributed Systems 18 (2), 212-224, 2007
Collaborative multi-tier caching in heterogeneous networks: Modeling, analysis, and design
X Li, X Wang, K Li, Z Han, VCM Leung
IEEE Transactions on Wireless Communications 16 (10), 6926-6939, 2017
The system can't perform the operation now. Try again later.
Articles 1–20