Dual sentiment analysis: Considering two sides of one review R Xia, F Xu, C Zong, Q Li, Y Qi, T Li IEEE transactions on knowledge and data engineering 27 (8), 2120-2133, 2015 | 160 | 2015 |
A novel data-driven stock price trend prediction system J Zhang, S Cui, Y Xu, Q Li, T Li Expert Systems with Applications 97, 60-69, 2018 | 137 | 2018 |
EACMS: Emergency access control management system for personal health record based on blockchain AR Rajput, Q Li, MT Ahvanooey, I Masood IEEE Access 7, 84304-84317, 2019 | 114 | 2019 |
Social network user influence sense-making and dynamics prediction J Li, W Peng, T Li, T Sun, Q Li, J Xu Expert Systems with Applications 41 (11), 5115-5124, 2014 | 99 | 2014 |
Adversarial deep ensemble: Evasion attacks and defenses for malware detection D Li, Q Li IEEE Transactions on Information Forensics and Security 15, 3886-3900, 2020 | 98 | 2020 |
A survey on smartphones security: software vulnerabilities, malware, and attacks MT Ahvanooey, Q Li, M Rabbani, AR Rajput arXiv preprint arXiv:2001.09406, 2020 | 93 | 2020 |
A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds Z Cai, X Li, R Ruiz, Q Li Future Generation Computer Systems 71, 57-72, 2017 | 79 | 2017 |
Modern text hiding, text steganalysis, and applications: a comparative analysis M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen Entropy 21 (4), 355, 2019 | 63 | 2019 |
A comparative analysis of information hiding techniques for copyright protection of text documents M Taleby Ahvanooey, Q Li, HJ Shim, Y Huang Security and Communication Networks 2018, 2018 | 61 | 2018 |
AITSteg: An innovative text steganography technique for hidden transmission of text message via social media MT Ahvanooey, Q Li, J Hou, HD Mazraeh, J Zhang IEEE Access 6, 65981-65995, 2018 | 58 | 2018 |
A Survey of Genetic Programming and Its Applications. MT Ahvanooey, Q Li, M Wu, S Wang KSII Trans. Internet Inf. Syst. 13 (4), 1765-1794, 2019 | 57 | 2019 |
Exploring the diversity in cluster ensemble generation: Random sampling and random projection F Yang, X Li, Q Li, T Li Expert Systems with Applications 41 (10), 4844-4866, 2014 | 55 | 2014 |
Differentially private classification with decision tree ensemble X Liu, Q Li, T Li, D Chen Applied Soft Computing 62, 807-816, 2018 | 51 | 2018 |
Long short-term memory neural network for network traffic prediction Q Zhuo, Q Li, H Yan, Y Qi 2017 12th International Conference on Intelligent Systems and Knowledge …, 2017 | 51 | 2017 |
Elasticsim: A toolkit for simulating workflows with cloud resource runtime auto-scaling and stochastic task execution times Z Cai, Q Li, X Li Journal of Grid Computing 15, 257-272, 2017 | 51 | 2017 |
A framework for enhancing deep neural networks against adversarial malware D Li, Q Li, Y Ye, S Xu IEEE Transactions on Network Science and Engineering 8 (1), 736-750, 2021 | 46* | 2021 |
ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media MT Ahvanooey, Q Li, X Zhu, M Alazab, J Zhang Computers & Security 90, 101702, 2020 | 45 | 2020 |
Double-sided bidding mechanism for resource sharing in mobile cloud L Tang, S He, Q Li IEEE Transactions on vehicular technology 66 (2), 1798-1809, 2016 | 45 | 2016 |
Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System L Xu, F Qian, Y Li, Q Li, Y Yang, J Xu Neurocomputing 173, 1250-1256, 2016 | 45 | 2016 |
Safety risk monitoring of cyber-physical power systems based on ensemble learning algorithm Q Li, S Meng, S Zhang, M Wu, J Zhang, MT Ahvanooey, MS Aslam IEEE Access 7, 24788-24805, 2019 | 44 | 2019 |