Efficient computing resource sharing for mobile edge-cloud computing networks Y Zhang, X Lan, J Ren, L Cai IEEE/ACM Transactions on Networking 28 (3), 1227-1240, 2020 | 191 | 2020 |
Efficient computation resource management in mobile edge-cloud computing Y Zhang, X Lan, Y Li, L Cai, J Pan IEEE Internet of Things Journal 6 (2), 3455-3466, 2018 | 69 | 2018 |
Energy efficient buffer-aided transmission scheme in wireless powered cooperative NOMA relay network X Lan, Y Zhang, Q Chen, L Cai IEEE Transactions on Communications 68 (3), 1432-1447, 2019 | 32 | 2019 |
Achievable rate region of the buffer-aided two-way energy harvesting relay network X Lan, Q Chen, X Tang, L Cai IEEE Transactions on Vehicular Technology 67 (11), 11127-11142, 2018 | 31 | 2018 |
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique Y Li, Y Wang, T Li, B Li, X Lan Knowledge-Based Systems 228, 107269, 2021 | 27 | 2021 |
Buffer-aided adaptive wireless powered communication network with finite energy storage and data buffer X Lan, Q Chen, L Cai, L Fan IEEE Transactions on Wireless Communications 18 (12), 5764-5779, 2019 | 20 | 2019 |
Achievable rate region of energy-harvesting based secure two-way buffer-aided relay networks Y Nie, X Lan, Y Liu, Q Chen, G Chen, L Fan, D Tang IEEE transactions on information forensics and security 16, 1610-1625, 2020 | 19 | 2020 |
Execution latency and energy consumption tradeoff in mobile-edge computing systems X Lan, L Cai, Q Chen 2019 IEEE/CIC International Conference on Communications in China (ICCC …, 2019 | 16 | 2019 |
Adaptive transmission design for rechargeable wireless sensor network with a mobile sink X Lan, Y Zhang, L Cai, Q Chen IEEE Internet of Things Journal 7 (9), 9011-9025, 2020 | 15 | 2020 |
Achievable secrecy rate region for buffer-aided multiuser MISO systems X Lan, J Ren, Q Chen, L Cai IEEE Transactions on Information Forensics and Security 15, 3311-3324, 2020 | 12 | 2020 |
XSS adversarial example attacks based on deep reinforcement learning L Chen, C Tang, J He, H Zhao, X Lan, T Li Computers & Security 120, 102831, 2022 | 11 | 2022 |
On the adaptive AoI-aware buffer-aided transmission scheme for NOMA networks J Chen, Y Liu, Q Chen, X Lan, G Cheng, Y Fu, Z Zhang 2021 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2021 | 11 | 2021 |
Throughput-optimal h-qmw scheduling for hybrid wireless networks with persistent and dynamic flows X Lan, Y Chen, L Cai IEEE Transactions on Wireless Communications 19 (2), 1182-1195, 2019 | 11 | 2019 |
An immune-based risk assessment method for digital virtual assets J He, T Li, B Li, X Lan, Z Li, Y Wang Computers & Security 102, 102134, 2021 | 10 | 2021 |
Comprehensive android malware detection based on federated learning architecture W Fang, J He, W Li, X Lan, Y Chen, T Li, J Huang, L Zhang IEEE Transactions on Information Forensics and Security, 2023 | 7 | 2023 |
Adaptive content placement in edge networks based on hybrid user preference learning L Zhao, X Lan, L Cai, J Pan 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 5 | 2019 |
Secure offloading design in multi-user mobile-edge computing systems Z Zhang, Y Fu, G Cheng, X Lan, Q Chen 2021 IEEE 6th International Conference on Computer and Communication Systems …, 2021 | 4 | 2021 |
On the energy constrained data collection in multi-uav-enabled wireless sensor networks G Yang, Y Liu, X Lan, Q Chen 2022 7th International Conference on Computer and Communication Systems …, 2022 | 3 | 2022 |
Wireless Powered Buffer-Aided Communication Over -User Interference Channel X Lan, Q Chen, L Cai 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-6, 2018 | 3 | 2018 |
On the transmit power and delivery delay tradeoff in buffer-aided two-way relay networks X Lan, Q Chen, X Tang 2016 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2016 | 3 | 2016 |