Follow
Hai Jin
Title
Cited by
Cited by
Year
Vuldeepecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
arXiv preprint arXiv:1801.01681, 2018
8882018
Performance and energy modeling for live migration of virtual machines
H Liu, CZ Xu, H Jin, J Gong, X Liao
Proceedings of the 20th ACM International Symposium on High Performance …, 2013
6272013
Color image segmentation based on mean shift and normalized cuts
W Tao, H Jin, Y Zhang
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37 …, 2007
5222007
Sysevr: A framework for using deep learning to detect software vulnerabilities
Z Li, D Zou, S Xu, H Jin, Y Zhu, Z Chen
IEEE Transactions on Dependable and Secure Computing 19 (4), 2244-2258, 2021
4972021
Anysee: Peer-to-peer live streaming
X Liao, H Jin, Y Liu, LM Ni, D Deng
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
4972006
Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications
F Liu, P Shu, H Jin, L Ding, J Yu, D Niu, B Li
IEEE Wireless communications 20 (3), 14-22, 2013
4702013
Live virtual machine migration with adaptive, memory compression
H Jin, L Deng, S Wu, X Shi, X Pan
2009 IEEE International Conference on Cluster Computing and Workshops, 1-10, 2009
4552009
A manifesto for future generation cloud computing: Research directions for the next decade
R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ...
ACM computing surveys (CSUR) 51 (5), 1-38, 2018
4032018
Computation offloading toward edge computing
L Lin, X Liao, H Jin, P Li
Proceedings of the IEEE 107 (8), 1584-1607, 2019
3752019
Cloudthings: A common architecture for integrating the internet of things with cloud computing
J Zhou, T Leppanen, E Harjula, M Ylianttila, T Ojala, C Yu, H Jin, LT Yang
Proceedings of the 2013 IEEE 17th international conference on computer …, 2013
3682013
Live migration of virtual machine based on full system trace and replay
H Liu, H Jin, X Liao, L Hu, C Yu
Proceedings of the 18th ACM international symposium on High performance …, 2009
3672009
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
P Xu, H Jin, Q Wu, W Wang
IEEE Transactions on computers 62 (11), 2266-2277, 2012
3222012
Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions
F Xu, F Liu, H Jin, AV Vasilakos
Proceedings of the IEEE 102 (1), 11-31, 2013
3212013
RAID-x: A new distributed disk array for I/O-centric cluster computing
K Hwang, H Jin, R Ho
Proceedings the Ninth International Symposium on High-Performance …, 2000
3152000
A game-theoretical approach for user allocation in edge computing environment
Q He, G Cui, X Zhang, F Chen, S Deng, H Jin, Y Li, Y Yang
IEEE Transactions on Parallel and Distributed Systems 31 (3), 515-529, 2019
3112019
iAware: Making live migration of virtual machines interference-aware in the cloud
F Xu, F Liu, L Liu, H Jin, B Li, B Li
IEEE Transactions on Computers 63 (12), 3012-3025, 2013
2602013
Leen: Locality/fairness-aware key partitioning for mapreduce in the cloud
S Ibrahim, H Jin, L Lu, S Wu, B He, L Qi
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
2582010
Object segmentation using ant colony optimization algorithm and fuzzy entropy
W Tao, H Jin, L Liu
Pattern Recognition Letters 28 (7), 788-796, 2007
2552007
Vulpecker: an automated vulnerability detection system based on code similarity analysis
Z Li, D Zou, S Xu, H Jin, H Qi, J Hu
Proceedings of the 32nd annual conference on computer security applications …, 2016
2542016
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
D Zou, S Wang, S Xu, Z Li, H Jin
IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2019
2472019
The system can't perform the operation now. Try again later.
Articles 1–20