A distributed spatial–temporal weighted model on MapReduce for short-term traffic flow forecasting D Xia, B Wang, H Li, Y Li, Z Zhang Neurocomputing 179, 246-263, 2016 | 211 | 2016 |
A novel Hash algorithm construction based on chaotic neural network Y Li, S Deng, D Xiao Neural Computing & Applications 20 (1), 133-141, 2011 | 148 | 2011 |
Using Data Augmentation in Continuous Authentication on Smartphones Y Li, H Hu, G Zhou IEEE Internet of Things Journal 6 (1), 628-640, 2019 | 115 | 2019 |
Analysis and improvement of a chaos-based Hash function construction S Deng, Y Li, D Xiao Communications in Nonlinear Science and Numerical Simulation 15 (5), 1338-1347, 2010 | 95 | 2010 |
SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks Y Li, H Hu, Z Zhu, G Zhou ACM Transactions on Sensor Networks 16 (3), 1-27, 2020 | 89 | 2020 |
AdaSense: Adapting sampling rates for activity recognition in body sensor networks X Qi, M Keally, G Zhou, Y Li, Z Ren 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium …, 2013 | 88 | 2013 |
A map reduce-based nearest neighbor approach for big-data-driven traffic flow prediction D Xia, H Li, B Wang, Y Li, Z Zhang IEEE access 4, 2920-2934, 2016 | 74 | 2016 |
A distributed WND-LSTM model on MapReduce for short-term traffic flow prediction D Xia, M Zhang, X Yan, Y Bai, Y Zheng, Y Li, H Li Neural Computing and Applications 33 (7), 2393–2410, 2021 | 66 | 2021 |
Using Feature Fusion Strategies in Continuous Authentication on Smartphones Y Li, B Zou, S Deng, G Zhou IEEE Internet Computing 24 (2), 49-56, 2020 | 63 | 2020 |
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification H Qin, MA El-Yacoubi, Y Li, C Liu IEEE Transactions on Information Forensics and Security 16, 2652-2666, 2021 | 61 | 2021 |
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks Y Li, X Qi, M Keally, Z Ren, G Zhou, D Xiao, S Deng IEEE Transactions on Parallel and Distributed Systems 24 (9), 1741-1751, 2013 | 51 | 2013 |
Chaotic hash function based on the dynamic S-Box with variable parameters Y Li, G Ge, D Xia Nonlinear Dynamics 84 (4), 2387-2402, 2016 | 50 | 2016 |
Parallel Hash function construction based on chaotic maps with changeable parameters Y Li, D Xiao, S Deng, Q Han, G Zhou Neural Computing & Applications 20 (8), 1305-1312, 2011 | 49 | 2011 |
Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression Y Li, H Hu, G Zhou, S Deng IEEE Access 6, 32554-32565, 2018 | 48 | 2018 |
Radiosense: Exploiting wireless communication patterns for body sensor network activity recognition X Qi, G Zhou, Y Li, G Peng 2012 IEEE 33rd Real-Time Systems Symposium, 95-104, 2012 | 48 | 2012 |
Analysis and improvement of a hash-based image encryption algorithm S Deng, Y Zhan, D Xiao, Y Li Communications in Nonlinear Science and Numerical Simulation 16 (8), 3269–3278, 2011 | 47 | 2011 |
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security Y Li, G Ge Multimedia Tools and Applications 78 (13), 17973–17994, 2019 | 44 | 2019 |
A driving behavior detection system based on a smartphone's built‐in sensor Y Li, F Xue, L Feng, Z Qu International Journal of Communication Systems 30 (8), 1-13, 2017 | 41 | 2017 |
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion Y Li, P Tao, S Deng, G Zhou ACM Transactions on Sensor Networks 18 (2), 1-20, 2022 | 38 | 2022 |
A fast and efficient hash function based on generalized chaotic mapping with variable parameters Y Li, X Li, X Liu Neural Computing and Applications 28 (6), 1405–1415, 2017 | 37 | 2017 |